Use of security logs for data leak detection: a systematic literature review

R Ávila, R Khoury, R Khoury… - Security and …, 2021 - Wiley Online Library
Security logs are widely used to monitor data, networks, and computer activities. By
analyzing them, security experts can pick out anomalies that reveal the presence of cyber …

Dynamic real-time pricing mechanism for electric vehicles charging considering optimal microgrids energy management system

TM Aljohani, AF Ebrahim… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Managing electric vehicles (EVs) charging activities when the power grid is congested is a
challenging task. This article proposes a dynamic, real-time, demand-influenced energy …

Surface roughness prediction in fused deposition modelling by neural networks

A Boschetto, V Giordano, F Veniali - The International Journal of …, 2013 - Springer
Fused deposition modelling is a proven technology for the fabrication of both aesthetic and
functional prototypes. The obtainable roughness is the most limiting aspect for its …

Learning in the feed-forward random neural network: A critical review

M Georgiopoulos, C Li, T Kocak - Performance Evaluation, 2011 - Elsevier
The Random Neural Network (RNN) has received, since its inception in 1989, considerable
attention and has been successfully used in a number of applications. In this critical review …

Expert system gradient descent style training: Development of a defensible artificial intelligence technique

J Straub - Knowledge-Based Systems, 2021 - Elsevier
Artificial intelligence systems, which are designed with a capability to learn from the data
presented to them, are used throughout society. These systems are used to screen loan …

Iot network cybersecurity assessment with the associated random neural network

E Gelenbe, M Nakip - IEEE Access, 2023 - ieeexplore.ieee.org
This paper proposes a method to assess the security of an device, or IP address, IoT
network by simultaneously identifying all the compromised IoT devices and IP addresses. It …

A neural network-based soft sensor for particle size distribution using image analysis

YD Ko, H Shang - Powder Technology, 2011 - Elsevier
Many industrial processes require on-line measurement of particle size and particle size
distribution for process monitoring and control. The available techniques for reliable on-line …

Bayesian regularization-based Levenberg–Marquardt neural model combined with BFOA for improving surface finish of FDM processed part

SS Mahapatra, AK Sood - The International Journal of Advanced …, 2012 - Springer
Fused deposition modeling has a complex part building mechanism making it difficult to
obtain reasonably good functional relationship between responses and process parameters …

[HTML][HTML] System-wide vulnerability of multi-component software

E Gelenbe, M Nakıp, M Siavvas - Computers & Industrial Engineering, 2024 - Elsevier
In software systems comprised of many interconnected components, the vulnerability of
each component will affect the vulnerability of other components and of the system as a …

Random neural network for lightweight attack detection in the iot

K Filus, J Domańska, E Gelenbe - … 2020, Nice, France, November 17–19 …, 2021 - Springer
Cyber-attack detection has become a basic component of all information processing
systems, and once an attack is detected it may be possible to block or mitigate its effects …