A comprehensive review of dimensionality reduction techniques for feature selection and feature extraction

R Zebari, A Abdulazeez, D Zeebaree, D Zebari… - Journal of Applied …, 2020 - jastt.org
Due to sharp increases in data dimensions, working on every data mining or machine
learning (ML) task requires more efficient techniques to get the desired results. Therefore, in …

A review of principal component analysis algorithm for dimensionality reduction

BMS Hasan, AM Abdulazeez - Journal of Soft Computing …, 2021 - publisher.uthm.edu.my
Big databases are increasingly widespread and are therefore hard to understand, in
exploratory biomedicine science, big data in health research is highly exciting because data …

Overview and comparative study of dimensionality reduction techniques for high dimensional data

S Ayesha, MK Hanif, R Talib - Information Fusion, 2020 - Elsevier
The recent developments in the modern data collection tools, techniques, and storage
capabilities are leading towards huge volume of data. The dimensions of data indicate the …

Towards the deployment of machine learning solutions in network traffic classification: A systematic survey

F Pacheco, E Exposito, M Gineste… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Traffic analysis is a compound of strategies intended to find relationships, patterns,
anomalies, and misconfigurations, among others things, in Internet traffic. In particular, traffic …

[HTML][HTML] System log clustering approaches for cyber security applications: A survey

M Landauer, F Skopik, M Wurzenberger, A Rauber - Computers & Security, 2020 - Elsevier
Log files give insight into the state of a computer system and enable the detection of
anomalous events relevant to cyber security. However, automatically analyzing log data is …

Demystifying analytical information processing capability: The case of cybersecurity incident response

H Naseer, SB Maynard, KC Desouza - Decision Support Systems, 2021 - Elsevier
Little is known about how organizations leverage business analytics (BA) to develop,
process, and exploit analytical information in cybersecurity incident response (CSIR) …

Edge intelligence (EI)-enabled HTTP anomaly detection framework for the Internet of Things (IoT)

Y An, FR Yu, J Li, J Chen… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In recent years, with the rapid development of the Internet of Things (IoT), various
applications based on IoT have become more and more popular in industrial and living …

Clustering‐based real‐time anomaly detection—A breakthrough in big data technologies

RA Ariyaluran Habeeb, F Nasaruddin… - Transactions on …, 2022 - Wiley Online Library
Off late, the ever increasing usage of a connected Internet‐of‐Things devices has
consequently augmented the volume of real‐time network data with high velocity. At the …

[HTML][HTML] Dynamic log file analysis: An unsupervised cluster evolution approach for anomaly detection

M Landauer, M Wurzenberger, F Skopik, G Settanni… - computers & …, 2018 - Elsevier
Technological advances and increased interconnectivity have led to a higher risk of
previously unknown threats. Cyber Security therefore employs Intrusion Detection Systems …

[PDF][PDF] The effect of different dimensionality reduction techniques on machine learning overfitting problem

MA Salam, AT Azar, MS Elgendy… - Int. J. Adv. Comput. Sci …, 2021 - researchgate.net
In most conditions, it is a problematic mission for a machine-learning model with a data
record, which has various attributes, to be trained. There is always a proportional …