Real-time big data processing for anomaly detection: A survey

RAA Habeeb, F Nasaruddin, A Gani… - International Journal of …, 2019 - Elsevier
The advent of connected devices and omnipresence of Internet have paved way for
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …

Supervised feature selection techniques in network intrusion detection: A critical review

M Di Mauro, G Galatro, G Fortino, A Liotta - Engineering Applications of …, 2021 - Elsevier
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …

[HTML][HTML] A survey of open source tools for machine learning with big data in the Hadoop ecosystem

S Landset, TM Khoshgoftaar, AN Richter, T Hasanin - Journal of Big Data, 2015 - Springer
With an ever-increasing amount of options, the task of selecting machine learning tools for
big data can be difficult. The available tools have advantages and drawbacks, and many …

A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems

M Imran, HUR Siddiqui, A Raza, MA Raza… - Computers & …, 2023 - Elsevier
Cybersecurity incident response is a very crucial part of the cybersecurity management
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …

Optimized deep learning for genre classification via improved moth flame algorithm

B Kumaraswamy - Multimedia Tools and Applications, 2022 - Springer
Musical genres are categorical labels created by humans for characterizing pieces of music.
This categorization of musical genre is done by the common characteristics shared by its …

Managing design-time uncertainty

M Famelis, M Chechik - Software & Systems Modeling, 2019 - Springer
Managing design-time uncertainty, ie, uncertainty that developers have about making
design decisions, requires creation of “uncertainty-aware” software engineering …

[HTML][HTML] Cross-site scripting guardian: A static XSS detector based on data stream input-output association mining

C Li, Y Wang, C Miao, C Huang - Applied Sciences, 2020 - mdpi.com
The largest number of cybersecurity attacks is on web applications, in which Cross-Site
Scripting (XSS) is the most popular way. The code audit is the main method to avoid the …

Energy conserving ring cluster‐based routing protocol for wireless sensor network: a hybrid based model

JMJ Sumesh, CP Maheswaran - International Journal of …, 2021 - Wiley Online Library
The recent advancement in WSNs has drawn its attentive toward number of researchers as it
is supportive to the wide range of applications. During the routing mechanism in WSN, the …

A multi-dimensional comparison of toolkits for machine learning with big data

AN Richter, TM Khoshgoftaar… - … on information reuse …, 2015 - ieeexplore.ieee.org
Big data is a big business, and effective modeling of this data is key. This paper provides a
comprehensive multidimensional analysis of various open source tools for machine learning …

A fog based load forecasting strategy based on multi-ensemble classification for smart grids

AH Rabie, SH Ali, AI Saleh, HA Ali - Journal of Ambient Intelligence and …, 2020 - Springer
Internet of things (IoT) improves the development and operation of smart electrical grids
(SEGs). Overcoming the cloud challenges, 2-tier architecture is replaced by 3-tier one for …