[图书][B] Cyber threat intelligence: challenges and opportunities

M Conti, T Dargahi, A Dehghantanha - 2018 - Springer
The ever increasing number of cyber attacks requires the cyber security and forensic
specialists to detect, analyze and defend against the cyber threats in almost real-time. In …

Bridge infrastructure asset management system: Comparative computational machine learning approach for evaluating and predicting deck deterioration conditions

R Assaad, IH El-Adaway - Journal of Infrastructure Systems, 2020 - ascelibrary.org
Bridge infrastructure asset management system is a prevailing approach toward having an
effective and efficient procedure for monitoring bridges through their different development …

Machine Learning Applications in Cyber Threat Intelligence: A Comprehensive Review

I Naseer - The Asian Bulletin of Big Data Management, 2023 - abbdm.com
Contemporary institutions are consistently confronted with fraudulent activities that exploit
weaknesses in interconnected systems. Securing critical data against unauthorized access …

Machine learning techniques for classifying network anomalies and intrusions

Z Li, ALG Rios, G Xu, L Trajković - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
Using machine learning techniques to detect network intrusions is an important topic in
cybersecurity. A variety of machine learning models have been designed to help detect …

Machine learning for detecting anomalies and intrusions in communication networks

Z Li, ALG Rios, L Trajković - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
Cyber attacks are becoming more sophisticated and, hence, more difficult to detect. Using
efficient and effective machine learning techniques to detect network anomalies and …

Evaluation and prediction of the hazard potential level of dam infrastructures using computational artificial intelligence algorithms

R Assaad, IH El-Adaway - Journal of Management in Engineering, 2020 - ascelibrary.org
Failures of dams cause immense property and environmental damages and take thousands
of lives. As such, the goal of this paper is to evaluate and predict the hazard potential level of …

Detection of denial of service attacks in communication networks

ALG Rios, Z Li, K Bekshentayeva… - 2020 IEEE international …, 2020 - ieeexplore.ieee.org
Detection of evolving cyber attacks is a challenging task for conventional network intrusion
detection techniques. Various supervised machine learning algorithms have been …

[PDF][PDF] Sec-EdgeAI: AI for edge security Vs security for edge AI

P Porambage, T Kumar, M Liyanage… - The 1st 6G Wireless …, 2019 - researchgate.net
In the next generation, 5G and beyond 5G, networks cyber-security solutions are
increasingly incorporating Artificial Intelligence (AI) and Machine Learning (ML) techniques …

Detecting internet worms, ransomware, and blackouts using recurrent neural networks

Z Li, ALG Rios, L Trajković - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Analyzing and detecting Border Gateway Protocol (BGP) anomalies are topics of great
interest in cybersecurity. Various anomaly detection approaches such as time series and …

Analyzing coating conditions of steel bridges at Florida: A data-driven approach

MA Rahman, L Zhang, X Lv, K Lau - Journal of Performance of …, 2023 - ascelibrary.org
Even with the continuous development of coating technologies, coating systems are
susceptible to corrosion-induced premature failures and unable to meet the anticipated …