BMS Hasan, AM Abdulazeez - Journal of Soft Computing …, 2021 - publisher.uthm.edu.my
Big databases are increasingly widespread and are therefore hard to understand, in exploratory biomedicine science, big data in health research is highly exciting because data …
S Ayesha, MK Hanif, R Talib - Information Fusion, 2020 - Elsevier
The recent developments in the modern data collection tools, techniques, and storage capabilities are leading towards huge volume of data. The dimensions of data indicate the …
F Pacheco, E Exposito, M Gineste… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Traffic analysis is a compound of strategies intended to find relationships, patterns, anomalies, and misconfigurations, among others things, in Internet traffic. In particular, traffic …
Log files give insight into the state of a computer system and enable the detection of anomalous events relevant to cyber security. However, automatically analyzing log data is …
Little is known about how organizations leverage business analytics (BA) to develop, process, and exploit analytical information in cybersecurity incident response (CSIR) …
Y An, FR Yu, J Li, J Chen… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
In recent years, with the rapid development of the Internet of Things (IoT), various applications based on IoT have become more and more popular in industrial and living …
Off late, the ever increasing usage of a connected Internet‐of‐Things devices has consequently augmented the volume of real‐time network data with high velocity. At the …
Technological advances and increased interconnectivity have led to a higher risk of previously unknown threats. Cyber Security therefore employs Intrusion Detection Systems …
In most conditions, it is a problematic mission for a machine-learning model with a data record, which has various attributes, to be trained. There is always a proportional …