A survey of cyber crimes

Y Zhang, Y Xiao, K Ghaboosi, J Zhang… - Security and …, 2012 - Wiley Online Library
With the advancement of computer and information technology, cyber crime is now
becoming one of the most significant challenges facing law enforcement organizations …

[PDF][PDF] Applications of machine learning in cyber security

V Ford, A Siraj - Proceedings of the 27th international conference on …, 2014 - vford.me
Abstract Machine learning techniques have been applied in many areas of science due to
their unique properties like adaptability, scalability, and potential to rapidly adjust to new and …

[PDF][PDF] Deep learning and machine learning based anomaly detection in internet of things environments

A Gökdemir, A Calhan - Journal of the Faculty of Engineering …, 2022 - scholar.archive.org
Purpose: As the use of Internet of Things (IoT) systems has become widespread, cyber-
attacks against these systems have also increased. Cyber-attacks occurring in IoT …

Collaborative access control in on-line social networks

B Carminati, E Ferrari - 7th international conference on …, 2011 - ieeexplore.ieee.org
Topology-based access control is today a de-facto standard for protecting resources in On-
line Social Networks (OSNs) both within the research community and commercial OSNs …

Optimized LightGBM model for security and privacy issues in cyber‐physical systems

S Dalal, M Poongodi, UK Lilhore… - Transactions on …, 2023 - Wiley Online Library
Integrating physical, computational, and networking resources are the goal of cyber‐
physical systems, also known as smart‐embedded systems. By investing in a solid …

Traffic prediction based on machine learning for elastic optical networks

M Aibin - Optical Switching and Networking, 2018 - Elsevier
The increased data transfers and rapidly evolving cloud services lead to the inevitable need
for the new techniques applied to communication networks, such as AI, machine learning …

Detecting SYN flood attacks via statistical monitoring charts: A comparative study

B Bouyeddou, F Harrou, Y Sun… - 2017 5th International …, 2017 - ieeexplore.ieee.org
Accurate detection of cyber-attacks plays a central role in safeguarding computer networks
and information systems. This paper addresses the problem of detecting SYN flood attacks …

Deep learning inspired routing in ICN using Monte Carlo tree search algorithm

N Dutta, SK Patel, V Samusenkov… - Journal of Parallel and …, 2021 - Elsevier
Abstract Information Centric Networking (ICN) provides caching strategies to improve
network performance based on consumer demands from the intermediate routers. It reduces …

Review of syn-flooding attack detection mechanism

ME Manna, A Amphawan - arXiv preprint arXiv:1202.1761, 2012 - arxiv.org
Denial of Service (DoS) is a security threat which compromises the confidentiality of
information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP …

[PDF][PDF] Dynamic routing algorithms for cloud-ready elastic optical networks

M Aibin - Ph. D. dissertation, 2017 - researchgate.net
The growing popularity of streaming services, cloud computing and mobile applications,
increases Internet traffic volume year by year. The inflation of data transfer is inevitable and …