[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

A one-dimensional convolutional neural network (1D-CNN) based deep learning system for network intrusion detection

EUH Qazi, A Almorjan, T Zia - Applied Sciences, 2022 - mdpi.com
The connectivity of devices through the internet plays a remarkable role in our daily lives.
Many network-based applications are utilized in different domains, eg, health care, smart …

Machine-learning-enabled ddos attacks detection in p4 programmable networks

F Musumeci, AC Fidanci, F Paolucci, F Cugini… - Journal of Network and …, 2022 - Springer
Abstract Distributed Denial of Service (DDoS) attacks represent a major concern in modern
Software Defined Networking (SDN), as SDN controllers are sensitive points of failures in …

Intrusion detection system on IoT with 5G network using deep learning

N Yadav, S Pande, A Khamparia… - … and Mobile Computing, 2022 - Wiley Online Library
The Internet of Things (IoT) cyberattacks of fully integrated servers, applications, and
communications networks are increasing at exponential speed. As problems caused by the …

An efficient hyperparameter control method for a network intrusion detection system based on proximal policy optimization

H Han, H Kim, Y Kim - Symmetry, 2022 - mdpi.com
The complexity of network intrusion detection systems (IDSs) is increasing due to the
continuous increases in network traffic, various attacks and the ever-changing network …

Detecting DDoS attacks in cloud computing using extreme learning machine and adaptive differential evolution

GS Kushwah, V Ranga - Wireless Personal Communications, 2022 - Springer
Distributed denial of service (DDoS) attacks disrupt the availability of cloud services. The
detection of these attacks is a major challenge in the cloud computing environment. Machine …

SOC estimation using deep bidirectional gated recurrent units with tree parzen estimator hyperparameter optimization

DNT How, MA Hannan, MSH Lipu… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
State-of-charge (SOC) is a crucial battery quantity that needs constant monitoring to ensure
cell longevity and safe operation. However, SOC is not an observable quantity and cannot …

A deep learning approach to online social network account compromisation

EK Boahen, BE Bouya-Moko, F Qamar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The major threat to online social network (OSN) users is account compromisation.
Spammers now spread malicious messages by exploiting the trust relationship established …

An ameliorated multiattack network anomaly detection in distributed big data system-based enhanced stacking multiple binary classifiers

AA Alhabshy, BI Hameed, KA Eldahshan - IEEE Access, 2022 - ieeexplore.ieee.org
The growth of the Internet of Things (IoT) generates new processing, networking
infrastructure, data storage, and management capabilities. This massive volume of data may …

Hybrid machine learning approach based intrusion detection in cloud: A metaheuristic assisted model

B RM, HK Mewada, R BR - Multiagent and Grid Systems, 2022 - content.iospress.com
Cloud computing provides various cost-effective on-demand services to the user and so it is
rising like a real trend in the IT service model. However, due to its open and distributed …