[HTML][HTML] Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects

IH Sarker - Annals of Data Science, 2023 - Springer
Due to the digitization and Internet of Things revolutions, the present electronic world has a
wealth of cybersecurity data. Efficiently resolving cyber anomalies and attacks is becoming a …

[HTML][HTML] Machine learning for wireless sensor networks security: An overview of challenges and issues

R Ahmad, R Wazirali, T Abu-Ain - Sensors, 2022 - mdpi.com
Energy and security are major challenges in a wireless sensor network, and they work
oppositely. As security complexity increases, battery drain will increase. Due to the limited …

Outlier detection using isolation forest and local outlier factor

Z Cheng, C Zou, J Dong - Proceedings of the conference on research in …, 2019 - dl.acm.org
Outlier detection, also named as anomaly detection, is one of the hot issues in the field of
data mining. As well-known outlier detection algorithms, Isolation Forest (iForest) and Local …

IoT based real-time river water quality monitoring system

MSU Chowdury, TB Emran, S Ghosh, A Pathak… - Procedia computer …, 2019 - Elsevier
Current water quality monitoring system is a manual system with a monotonous process and
is very time-consuming. This paper proposes a sensor-based water quality monitoring …

Anomaly detection, analysis and prediction techniques in iot environment: A systematic literature review

M Fahim, A Sillitti - IEEE Access, 2019 - ieeexplore.ieee.org
Anomaly detection has attracted considerable attention from the research community in the
past few years due to the advancement of sensor monitoring technologies, low-cost …

Multi‐aspects AI‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview

IH Sarker - Security and Privacy, 2023 - Wiley Online Library
Due to the rising dependency on digital technology, cybersecurity has emerged as a more
prominent field of research and application that typically focuses on securing devices …

[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical …

IH Sarker, H Janicke, MA Ferrag, A Abuadbba - Internet of Things, 2024 - Elsevier
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …

Static hand gesture recognition using convolutional neural network with data augmentation

MZ Islam, MS Hossain, R ul Islam… - 2019 Joint 8th …, 2019 - ieeexplore.ieee.org
Computer is a part and parcel in our day to day life and used in various fields. The
interaction of human and computer is accomplished by conventional input devices like …

Machine learning with Belief Rule-Based Expert Systems to predict stock price movements

E Hossain, MS Hossain, PO Zander… - Expert Systems with …, 2022 - Elsevier
Price prediction of financial assets has been a key interest for researchers over the decades.
Numerous techniques to predict the price movements have been developed by the …

[HTML][HTML] Review of transit data sources: potentials, challenges and complementarity

L Ge, M Sarhani, S Voß, L Xie - Sustainability, 2021 - mdpi.com
Public transport has become one of the major transport options, especially when it comes to
reducing motorized individual transport and achieving sustainability while reducing …