R Assaad, IH El-Adaway - Journal of Infrastructure Systems, 2020 - ascelibrary.org
Bridge infrastructure asset management system is a prevailing approach toward having an effective and efficient procedure for monitoring bridges through their different development …
I Naseer - The Asian Bulletin of Big Data Management, 2023 - abbdm.com
Contemporary institutions are consistently confronted with fraudulent activities that exploit weaknesses in interconnected systems. Securing critical data against unauthorized access …
Using machine learning techniques to detect network intrusions is an important topic in cybersecurity. A variety of machine learning models have been designed to help detect …
Z Li, ALG Rios, L Trajković - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
Cyber attacks are becoming more sophisticated and, hence, more difficult to detect. Using efficient and effective machine learning techniques to detect network anomalies and …
R Assaad, IH El-Adaway - Journal of Management in Engineering, 2020 - ascelibrary.org
Failures of dams cause immense property and environmental damages and take thousands of lives. As such, the goal of this paper is to evaluate and predict the hazard potential level of …
Detection of evolving cyber attacks is a challenging task for conventional network intrusion detection techniques. Various supervised machine learning algorithms have been …
In the next generation, 5G and beyond 5G, networks cyber-security solutions are increasingly incorporating Artificial Intelligence (AI) and Machine Learning (ML) techniques …
Analyzing and detecting Border Gateway Protocol (BGP) anomalies are topics of great interest in cybersecurity. Various anomaly detection approaches such as time series and …
MA Rahman, L Zhang, X Lv, K Lau - Journal of Performance of …, 2023 - ascelibrary.org
Even with the continuous development of coating technologies, coating systems are susceptible to corrosion-induced premature failures and unable to meet the anticipated …