[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

An overview on the applications of typical non-linear algorithms coupled with NIR spectroscopy in food analysis

M Zareef, Q Chen, MM Hassan, M Arslan… - Food Engineering …, 2020 - Springer
Near-infrared (NIR) spectroscopy as a low-cost technique with its non-destructive fast
nature, precision, control, accuracy, repeatability, and reproducibility has been extensively …

HAST-IDS: Learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection

W Wang, Y Sheng, J Wang, X Zeng, X Ye… - IEEE …, 2017 - ieeexplore.ieee.org
The development of an anomaly-based intrusion detection system (IDS) is a primary
research direction in the field of intrusion detection. An IDS learns normal and anomalous …

SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism

D Jin, Y Lu, J Qin, Z Cheng, Z Mao - Computers & Security, 2020 - Elsevier
High-speed networks are becoming common nowadays. Naturally, a challenge that arises is
that the intrusion detection system (IDS) should timely detect attacks in huge volumes of …

The use of ensemble models for multiple class and binary class classification for improving intrusion detection systems

C Iwendi, S Khan, JH Anajemba, M Mittal, M Alenezi… - Sensors, 2020 - mdpi.com
The pursuit to spot abnormal behaviors in and out of a network system is what led to a
system known as intrusion detection systems for soft computing besides many researchers …

M-AdaBoost-A based ensemble system for network intrusion detection

Y Zhou, TA Mazzuchi, S Sarkani - Expert Systems with Applications, 2020 - Elsevier
Network intrusion detection remains a challenging research area as it involves learning from
large-scale imbalanced multiclass datasets. While machine learning algorithms have been …

Data mining techniques in intrusion detection systems: A systematic literature review

F Salo, M Injadat, AB Nassif, A Shami, A Essex - IEEE Access, 2018 - ieeexplore.ieee.org
The continued ability to detect malicious network intrusions has become an exercise in
scalability, in which data mining techniques are playing an increasingly important role. We …

A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks

N Hu, Z Tian, H Lu, X Du, M Guizani - International Journal of Machine …, 2021 - Springer
The 5G network provides higher bandwidth and lower latency for edge IoT devices to access
the core business network. But at the same time, it also expands the attack surface of the …

[PDF][PDF] Intrusion Detection Systems, Issues, Challenges, and Needs.

M Al-Janabi, MA Ismail, AH Ali - Int. J. Comput. Intell. Syst., 2021 - academia.edu
Intrusion detection systems (IDSs) are one of the promising tools for protecting data and
networks; many classification algorithms, such as neural network (NN), Naive Bayes (NB) …

Application of intrusion detection technology in network safety based on machine learning

W Fang, X Tan, D Wilbur - Safety Science, 2020 - Elsevier
As an important means to ensure network safety, intrusion detection technology can be
much more efficient by introducing machine learning. The present paper proposes a …