A Review on Machine Learning Strategies for Real‐World Engineering Applications

RH Jhaveri, A Revathi, K Ramana… - Mobile Information …, 2022 - Wiley Online Library
Huge amounts of data are circulating in the digital world in the era of the Industry 5.0
revolution. Machine learning is experiencing success in several sectors such as intelligent …

Threats from the dark: a review over dark web investigation research for cyber threat intelligence

R Basheer, B Alkhatib - Journal of Computer Networks and …, 2021 - Wiley Online Library
From proactive detection of cyberattacks to the identification of key actors, analyzing
contents of the Dark Web plays a significant role in deterring cybercrimes and understanding …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

The art of cybercrime community research

J Hughes, S Pastrana, A Hutchings, S Afroz… - ACM Computing …, 2024 - dl.acm.org
In the last decade, cybercrime has risen considerably. One key factor is the proliferation of
online cybercrime communities, where actors trade products and services, and also learn …

Detecting malicious behavior in social platforms via hybrid knowledge-and data-driven systems

JN Paredes, GI Simari, MV Martinez… - Future Generation …, 2021 - Elsevier
Among the wide variety of malicious behavior commonly observed in modern social
platforms, one of the most notorious is the diffusion of fake news, given its potential to …

Modeling and management of cyber risk: a cross-disciplinary review

R He, Z Jin, JSH Li - Annals of Actuarial Science, 2024 - cambridge.org
This paper provides a review of cyber risk research accomplished in different disciplines,
with a primary goal to aid researchers in the field of insurance and actuarial science in …

Mining user interaction patterns in the darkweb to predict enterprise cyber incidents

S Sarkar, M Almukaynizi, J Shakarian… - Social Network Analysis …, 2019 - Springer
With the rise in security breaches over the past few years, there has been an increasing
need to mine insights from social media platforms to raise alerts of possible attacks in an …

NetDER: An Architecture for Reasoning About Malicious Behavior

JN Paredes, GI Simari, MV Martinez… - Information Systems …, 2021 - Springer
Malicious behavior in social media has many faces, which for instance appear in the form of
bots, sock puppets, creation and dissemination of fake news, Sybil attacks, and actors hiding …

Ontology-based model for security assessment: Predicting cyberattacks through threat activity analysis

P Yermalovich - International Journal of Network Security & Its …, 2020 - papers.ssrn.com
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk
forecasting contributes a lot to the optimization of the information security budget. This article …

Strisk: a socio-technical approach to assess hacking breaches risk

H Hammouchi, N Nejjari, G Mezzour… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Data breaches have begun to take on new dimensions and their prediction is becoming of
great importance to organizations. Prior work has addressed this issue mainly from a …