A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system

MHL Louk, BA Tama - Expert Systems with Applications, 2023 - Elsevier
The mission of an intrusion detection system (IDS) is to monitor network activities and
assess whether or not they are malevolent. Specifically, anomaly-based IDS can discover …

CFD analysis and optimum design for a centrifugal pump using an effectively artificial intelligent algorithm

CN Wang, FC Yang, VTT Nguyen, NTM Vo - Micromachines, 2022 - mdpi.com
In this study, we proposed a novel approach to improve centrifugal pump performance with
regard to the pump head, pump efficiency, and power. Firstly, to establish constraints, an …

[HTML][HTML] An outliers detection and elimination framework in classification task of data mining

CSK Dash, AK Behera, S Dehuri, A Ghosh - Decision Analytics Journal, 2023 - Elsevier
An outlier is a datum that is far from other data points in which it occurs. It can have a
considerable impact on the output. Therefore, removing or resolving it before the analysis is …

[HTML][HTML] Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review

S Sharma, V Kumar, K Dutta - Internet of Things and Cyber-Physical …, 2024 - Elsevier
The significance of intrusion detection systems in networks has grown because of the digital
revolution and increased operations. The intrusion detection method classifies the network …

Intrusion detection for the internet of things (IoT) based on the emperor penguin colony optimization algorithm

M Alweshah, A Hammouri, S Alkhalaileh… - Journal of Ambient …, 2023 - Springer
Abstract In the Internet of Things (IoT), the data that are sent via devices are sometimes
unrelated, duplicated, or erroneous, which makes it difficult to perform the required tasks …

An efficient optimization approach for designing machine models based on combined algorithm

A Larijani, F Dehghani - FinTech, 2023 - mdpi.com
Many intrusion detection algorithms that use optimization have been developed and are
commonly used to detect intrusions. The process of selecting features and the parameters of …

Cyber security using machine learning techniques

MA Manjramkar, KC Jondhale - International Conference on …, 2023 - atlantis-press.com
Abstract Machine learning (ML) is a subfield of Artificial Intelligence (AI) that contributes to
the development of systems that can learn from previous data, spot patterns, and make …

Categorizing the students' activities for automated exam proctoring using proposed deep L2-GraftNet CNN network and ASO based feature selection approach

T Saba, A Rehman, NSM Jamail, SL Marie-Sainte… - IEEE …, 2021 - ieeexplore.ieee.org
Exam proctoring is a hectic task ie, the monitoring of students' activities becomes difficult for
supervisors in the examination rooms. It is a costly approach that requires much labor. Also …

Grey wolf based feature reduction for intrusion detection in WSN using LSTM

S Karthic, S Manoj Kumar… - International Journal of …, 2022 - Springer
In the recent days all the digital devices including devices used in Healthcare, Personal
Digital Assistance etc. are connected to the network, consequently data is exposed to …