[HTML][HTML] Cybersecurity data science: an overview from machine learning perspective

IH Sarker, ASM Kayes, S Badsha, H Alqahtani… - Journal of Big …, 2020 - Springer
In a computing context, cybersecurity is undergoing massive shifts in technology and its
operations in recent days, and data science is driving the change. Extracting security …

Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning

P Spadaccino, F Cuomo - arXiv preprint arXiv:2012.01174, 2020 - arxiv.org
Key components of current cybersecurity methods are the Intrusion Detection Systems
(IDSs) were different techniques and architectures are applied to detect intrusions. IDSs can …

A study of ensemble methods for cyber security

N Lower, F Zhan - 2020 10th Annual Computing and …, 2020 - ieeexplore.ieee.org
Ensemble methods for machine learning serve to increase the predictive power of
preexisting models by applying a meta-algorithm on top of the underlying workings of one or …

A hybrid deep learning strategy for an anomaly based N-ids

H Mennour, S Mostefai - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
This paper presents a hybrid deep learning neural network for classifying the network traffic
data. In this regard, a Stacked Autoencoder and Feedforward neural network with tangent …

Exploratory Study of Requirements of Cybersecurity Specialists to Implement Security Tools in Hybrid Cloud Infrastructures

E Vernet - 2020 - search.proquest.com
The ability for organizations to efficiently secure their hybrid cloud infrastructures would
make the cloud even more appealing and reliable. This dissertation investigated the opinion …