[HTML][HTML] Cybersecurity threats and their mitigation approaches using Machine Learning—A Review

M Ahsan, KE Nygard, R Gomes… - … of Cybersecurity and …, 2022 - mdpi.com
Machine learning is of rising importance in cybersecurity. The primary objective of applying
machine learning in cybersecurity is to make the process of malware detection more …

A survey of data mining and machine learning methods for cyber security intrusion detection

AL Buczak, E Guven - IEEE Communications surveys & tutorials, 2015 - ieeexplore.ieee.org
This survey paper describes a focused literature survey of machine learning (ML) and data
mining (DM) methods for cyber analytics in support of intrusion detection. Short tutorial …

An industrial network intrusion detection algorithm based on multifeature data clustering optimization model

W Liang, KC Li, J Long, X Kui… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Industrial networks are complex and diverse. Among existing intrusion prevention systems
available, several of them have problems such as low detection accuracy rate, high false …

A systems and control perspective of CPS security

SM Dibaji, M Pirani, DB Flamholz… - Annual reviews in …, 2019 - Elsevier
The comprehensive integration of instrumentation, communication, and control into physical
systems has led to the study of Cyber-Physical Systems (CPSs), a field that has recently …

Botnet attack detection in Internet of Things devices over cloud environment via machine learning

M Waqas, K Kumar, AA Laghari… - Concurrency and …, 2022 - Wiley Online Library
With the arrival of the Internet of Things (IoT) many devices such as sensors, nowadays can
communicate with each other and share data easily. However, the IoT paradigm is prone to …

A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier

L Koc, TA Mazzuchi, S Sarkani - Expert Systems with Applications, 2012 - Elsevier
With increasing Internet connectivity and traffic volume, recent intrusion incidents have
reemphasized the importance of network intrusion detection systems for combating …

Network attacks: Taxonomy, tools and systems

N Hoque, MH Bhuyan, RC Baishya… - Journal of Network and …, 2014 - Elsevier
To prevent and defend networks from the occurrence of attacks, it is highly essential that we
have a broad knowledge of existing tools and systems available in the public domain. Based …

Distributed privacy-preserving collaborative intrusion detection systems for VANETs

T Zhang, Q Zhu - IEEE Transactions on Signal and Information …, 2018 - ieeexplore.ieee.org
Vehicular ad hoc network (VANET) is an enabling technology in modern transportation
systems for providing safety and valuable information, and yet vulnerable to a number of …

Feature deduction and ensemble design of intrusion detection systems

S Chebrolu, A Abraham, JP Thomas - Computers & security, 2005 - Elsevier
Current intrusion detection systems (IDS) examine all data features to detect intrusion or
misuse patterns. Some of the features may be redundant or contribute little (if anything) to …

[图书][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …