[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

[HTML][HTML] A hybrid CNN+ LSTM-based intrusion detection system for industrial IoT networks

HC Altunay, Z Albayrak - … Science and Technology, an International Journal, 2023 - Elsevier
Abstract The Internet of Things (IoT) ecosystem has proliferated based on the use of the
internet and cloud-based technologies in the industrial area. IoT technology used in the …

lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning

C Hazman, A Guezzaz, S Benkirane, M Azrour - Cluster Computing, 2023 - Springer
Smart cities are being enabled all around the world by Internet of Things (IoT) applications.
A smart city idea necessitates the integration of information and communication …

Ai meta-learners and extra-trees algorithm for the detection of phishing websites

YA Alsariera, VE Adeyemo, AO Balogun… - IEEE …, 2020 - ieeexplore.ieee.org
Phishing is a type of social web-engineering attack in cyberspace where criminals steal
valuable data or information from insensitive or uninformed users of the internet. Existing …

An advanced intrusion detection system for IIoT based on GA and tree based algorithms

SM Kasongo - IEEE Access, 2021 - ieeexplore.ieee.org
The evolution of the Internet and cloud-based technologies have empowered several
organizations with the capacity to implement large-scale Internet of Things (IoT)-based …

Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction

MA Talukder, MM Islam, MA Uddin, KF Hasan… - Journal of big …, 2024 - Springer
Cybersecurity has emerged as a critical global concern. Intrusion Detection Systems (IDS)
play a critical role in protecting interconnected networks by detecting malicious actors and …

Modern Smart Cities and Open Research Challenges and Issues of Explainable Artificial Intelligence

SR Sindiramutty, CE Tan, WJ Tee, SP Lau… - … in Explainable AI …, 2024 - igi-global.com
This chapter's purpose is to review the modern smart cities and open research challenges
and issues of explainable artificial intelligence (XAI). With the advent of XAI, people's lives …

Robust and accurate performance anomaly detection and prediction for cloud applications: a novel ensemble learning-based framework

R Xin, H Liu, P Chen, Z Zhao - Journal of Cloud Computing, 2023 - Springer
Effectively detecting run-time performance anomalies is crucial for clouds to identify
abnormal performance behavior and forestall future incidents. To be used for real-world …

Multi-class segmentation of organ at risk from abdominal ct images: A deep learning approach

MI Khalil, M Humayun, NZ Jhanjhi, MN Talib… - … and Innovation on Data …, 2021 - Springer
Medical imaging segmentation is an essential technique for modern medical applications. It
is the foundation of many aspects of clinical diagnosis, oncology and computer-integrated …

Evaluation of machine learning techniques for traffic flow-based intrusion detection

M Rodríguez, Á Alesanco, L Mehavilla, J García - Sensors, 2022 - mdpi.com
Cybersecurity is one of the great challenges of today's world. Rapid technological
development has allowed society to prosper and improve the quality of life and the world is …