Abstract Machine Learning (ML) techniques are becoming an invaluable support for network intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …
With an ever-increasing amount of options, the task of selecting machine learning tools for big data can be difficult. The available tools have advantages and drawbacks, and many …
Cybersecurity incident response is a very crucial part of the cybersecurity management system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …
B Kumaraswamy - Multimedia Tools and Applications, 2022 - Springer
Musical genres are categorical labels created by humans for characterizing pieces of music. This categorization of musical genre is done by the common characteristics shared by its …
Managing design-time uncertainty, ie, uncertainty that developers have about making design decisions, requires creation of “uncertainty-aware” software engineering …
C Li, Y Wang, C Miao, C Huang - Applied Sciences, 2020 - mdpi.com
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the …
JMJ Sumesh, CP Maheswaran - International Journal of …, 2021 - Wiley Online Library
The recent advancement in WSNs has drawn its attentive toward number of researchers as it is supportive to the wide range of applications. During the routing mechanism in WSN, the …
AN Richter, TM Khoshgoftaar… - … on information reuse …, 2015 - ieeexplore.ieee.org
Big data is a big business, and effective modeling of this data is key. This paper provides a comprehensive multidimensional analysis of various open source tools for machine learning …
Internet of things (IoT) improves the development and operation of smart electrical grids (SEGs). Overcoming the cloud challenges, 2-tier architecture is replaced by 3-tier one for …