Privacy preservation in Artificial Intelligence and Extended Reality (AI-XR) metaverses: A survey

M Alkaeed, A Qayyum, J Qadir - Journal of Network and Computer …, 2024 - Elsevier
The metaverse is a nascent concept that envisions a virtual universe, a collaborative space
where individuals can interact, create, and participate in a wide range of activities. Privacy in …

A Survey on the Applications of Semi-supervised Learning to Cyber-security

PK Mvula, P Branco, GV Jourdan, HL Viktor - ACM Computing Surveys, 2024 - dl.acm.org
Machine Learning's widespread application owes to its ability to develop accurate and
scalable models. In cyber-security, where labeled data is scarce, Semi-Supervised Learning …

Reinforcement learning for intrusion detection: More model longness and fewer updates

RR dos Santos, EK Viegas, AO Santin… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Several works have used machine learning techniques for network-based intrusion
detection over the past few years. While proposed schemes have been able to provide high …

A machine learning model for detection of docker-based APP overbooking on kubernetes

F Ramos, E Viegas, A Santin… - ICC 2021-IEEE …, 2021 - ieeexplore.ieee.org
Resource allocation overbooking is an approach used by cloud providers that allocates
more virtual resources than available on physical hardware, which may imply service quality …

A novel anomaly detection approach based on ensemble semi-supervised active learning (ADESSA)

Z Niu, W Guo, J Xue, Y Wang, Z Kong, L Huang - Computers & Security, 2023 - Elsevier
As an industrial infrastructure, the safety and reliability of the Cyber-Physical System
requires the effective anomaly detection. However, the existing detection methods have …

A real-time adaptive network intrusion detection for streaming data: a hybrid approach

MM Saeed - Neural Computing and Applications, 2022 - Springer
This study aimed at improving the performance of classifiers when trained to identify
signatures of unknown attacks. Furthermore, this paper addresses the following …

A host-based intrusion detection model based on OS diversity for SCADA

BB Bulle, AO Santin, EK Viegas… - IECON 2020 the 46th …, 2020 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) systems have been a frequent target of
cyberattacks in Industrial Control Systems (ICS). As such systems are a frequent target of …

[HTML][HTML] Anomaly detection method based on penalty least squares algorithm and time window entropy for Cyber–Physical Systems

J Zhang, Y Yuan, J Zhang, Y Yang, W Xie - Journal of King Saud University …, 2023 - Elsevier
Real-time system status detection must be accurate and reliable due to the close coupling of
Cyber–Physical Systems (CPS) components. In order to improve the effectiveness of the …

Semi-wtc: A practical semi-supervised framework for attack categorization through weight-task consistency

Z Li, W Chen, Z Wei, X Luo, B Su - arXiv preprint arXiv:2205.09669, 2022 - arxiv.org
Supervised learning has been widely used for attack categorization, requiring high-quality
data and labels. However, the data is often imbalanced and it is difficult to obtain sufficient …

K-Means clustering-based semi-supervised for DDoS attacks classification

MN Jasim, MT Gaata - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
Network attacks of the distributed denial of service (DDoS) form are used to disrupt server
replies and services. It is popular because it is easy to set up and challenging to detect. We …