A review on machine learning strategies for real‐world engineering applications

RH Jhaveri, A Revathi, K Ramana… - Mobile Information …, 2022 - Wiley Online Library
Huge amounts of data are circulating in the digital world in the era of the Industry 5.0
revolution. Machine learning is experiencing success in several sectors such as intelligent …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

A Survey on Software Vulnerability Exploitability Assessment

S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …

Darknet traffic big-data analysis and network management for real-time automating of the malicious intent detection process by a weight agnostic neural networks …

K Demertzis, K Tsiknas, D Takezis, C Skianis, L Iliadis - Electronics, 2021 - mdpi.com
Attackers are perpetually modifying their tactics to avoid detection and frequently leverage
legitimate credentials with trusted tools already deployed in a network environment, making …

Cyber warfare threat categorization on cps by dark web terrorist

V Mahor, R Rawat, A Kumar… - 2021 IEEE 4th …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) also referred as Cyber Physical Systems (CPS) as
critical elements, expected to play a key role in Industry 4.0 and always been vulnerable to …

FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm

Y Fang, Y Liu, C Huang, L Liu - Plos one, 2020 - journals.plos.org
In recent years, the number of vulnerabilities discovered and publicly disclosed has shown a
sharp upward trend. However, the value of exploitation of vulnerabilities varies for attackers …

Darknet traffic analysis and network management for malicious intent detection by neural network frameworks

P William, S Choubey, A Choubey… - … Intelligence for the Dark …, 2022 - igi-global.com
Security breaches may be difficult to detect because attackers are continually tweaking
methods to evade detection and utilize legitimate credentials that have already been …

Multiple social platforms reveal actionable signals for software vulnerability awareness: A study of GitHub, Twitter and Reddit

P Shrestha, A Sathanur, S Maharjan, E Saldanha… - Plos one, 2020 - journals.plos.org
The awareness about software vulnerabilities is crucial to ensure effective cybersecurity
practices, the development of high-quality software, and, ultimately, national security. This …

Sok: An evaluation of the secure end user experience on the dark net through systematic literature review

F Tazi, S Shrestha, J De La Cruz, S Das - Journal of Cybersecurity and …, 2022 - mdpi.com
The World Wide Web (www) consists of the surface web, deep web, and Dark Web,
depending on the content shared and the access to these network layers. Dark Web consists …

ExpSeeker: Extract public exploit code information from social media

Y Du, C Huang, G Liang, Z Fu, D Li, Y Ding - Applied Intelligence, 2023 - Springer
Malicious actors often utilize publicly available software vulnerabilities and exploit codes to
attack vulnerable targets. Exploit codes are shared across several platforms, including …