A critical historic overview of artificial intelligence: Issues, challenges, opportunities, and threats

PP Groumpos - Artificial Intelligence and Applications, 2023 - ojs.bonviewpress.com
Artificial intelligence (AI) has been considered a revolutionary and world-changing science,
although it is still a young field and has a long way to go before it can be established as a …

[HTML][HTML] A novel approach for APT attack detection based on feature intelligent extraction and representation learning

C Do Xuan, NH Cuong - Plos one, 2024 - journals.plos.org
Advanced Persistent Threat (APT) attacks are causing a lot of damage to critical
organizations and institutions. Therefore, early detection and warning of APT attack …

Integrating OT data in SIEM platforms: an Energy Utility Perspective

A Armellin, GB Gaggero, A Cattelino… - 2023 International …, 2023 - ieeexplore.ieee.org
One of the main current challenges for Security Information and Event Management (SIEM)
platforms is to integrate data generated by Industrial Control Systems (ICS). This paper …

Using knowledge graphs and contrastive learning for detecting APT Malware on Endpoint systems

CD Xuan, HD Nguyen - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
Advanced persistent threat (APT) attacking campaigns have been a common method for
cyber-attackers to attack and exploit end-user computers (workstations) in recent years. In …

Intelligent graph-based correlation of security events in cyber-physical systems

D Levshun, I Kotenko - … on Intelligent Information Technologies for Industry, 2023 - Springer
Security monitoring of cyber-physical systems, in particular in important areas such as
industry, energy, medicine and others, should be continuous. Information about the security …

GraphWeaver: Billion-Scale Cybersecurity Incident Correlation

S Freitas, A Gharib - arXiv preprint arXiv:2406.01842, 2024 - arxiv.org
In the dynamic landscape of large enterprise cybersecurity, accurately and efficiently
correlating billions of security alerts into comprehensive incidents is a substantial challenge …

Two-model active learning approach for inappropriate information classification in social networks

D Levshun, O Tushkanova, A Chechulin - International Journal of …, 2023 - Springer
The work process of specialists in protection from information consists of many time-
consuming tasks, including data collection, datasets formation, and data manual labelling. In …

Soft computing algorithms for infrastructure monitoring: preliminary results of PROION project

K Nikolakopoulos, V Mpelogianni… - … on Remote Sensing …, 2023 - spiedigitallibrary.org
Structural health monitoring of civil infrastructures is a complex engineering problem that
requires the use of advanced soft computing algorithms. The rapid advances in soft …

Enabling Sustainable Learning: A Machine Learning Approach for an Eco-friendly Multi-factor Adaptive E-Learning System

E Aymane, D Aziz, H Abdelfatteh, A Abdelhak - Procedia Computer Science, 2024 - Elsevier
Adaptive learning seeks to create personalized learning experiences by considering various
cognitive and affective factors. However, conventional adaptive models often fall short in …

Finding Harmony in the Noise: Blending Security Alerts for Attack Detection

TM Roelofs, E Barbaro, S Pekarskikh… - Proceedings of the 39th …, 2024 - dl.acm.org
Large-and medium-sized organizations employ various security systems to protect their
assets. These systems, often developed by different vendors, focus on different threats and …