A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities

D Levshun, I Kotenko - Artificial Intelligence Review, 2023 - Springer
Abstract Information systems need to process a large amount of event monitoring data. The
process of finding the relationships between events is called correlation, which creates a …

Adversarial attacks against network intrusion detection in IoT systems

H Qiu, T Dong, T Zhang, J Lu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Deep learning (DL) has gained popularity in network intrusion detection, due to its strong
capability of recognizing subtle differences between normal and malicious network activities …

Complex event processing for physical and cyber security in datacentres-recent progress, challenges and recommendations

KA Alaghbari, MHM Saad, A Hussain… - Journal of Cloud …, 2022 - Springer
A datacentre stores information and manages data access in fast and reliable manner.
Failure of datacentre operation is not an option and can be catastrophic. Internet of things …

[HTML][HTML] An ontology model to represent aquaponics 4.0 system's knowledge

R Abbasi, P Martinez, R Ahmad - Information Processing in Agriculture, 2022 - Elsevier
Aquaponics, one of the vertical farming methods, is a combination of aquaculture and
hydroponics. To enhance the production capabilities of the aquaponics system and …

VeeAlign: multifaceted context representation using dual attention for ontology alignment

V Iyer, A Agarwal, H Kumar - … of the 2021 Conference on Empirical …, 2021 - aclanthology.org
Ontology Alignment is an important research problem applied to various fields such as data
integration, data transfer, data preparation, etc. State-of-the-art (SOTA) Ontology Alignment …

OntoEnricher: a deep learning approach for ontology enrichment from unstructured text

LM Sanagavarapu, V Iyer… - Cybersecurity and High …, 2022 - taylorfrancis.com
Information Security in the cyber world is a major concern, with significant increase in attack
surfaces. Existing information on vulnerabilities, attacks, controls, and advisories available …

Modeling for malicious traffic detection in 6G next generation networks

H Ghorbani, MS Mohammadzadeh… - … on technology and …, 2020 - ieeexplore.ieee.org
Based on the digitalization of the world and the increasing use of data, we can say that the
next ten years will see a huge leap in the use of data in virtualization, automation, health and …

A deep learning approach for ontology enrichment from unstructured text

LM Sanagavarapu, V Iyer, R Reddy - arxiv preprint arxiv:2112.08554, 2021 - arxiv.org
Information Security in the cyber world is a major cause for concern, with a significant
increase in the number of attack surfaces. Existing information on vulnerabilities, attacks …

Estimating web attack detection via model uncertainty from inaccurate annotation

X Gong, Y Zhou, Y Bi, M He, S Sheng… - 2019 6th IEEE …, 2019 - ieeexplore.ieee.org
In the past decades, Machine Learning (ML) techniques have become a hot topic in the web
security field. Deep learning (DL), as a sub-field of machine learning, has proved its …

Model uncertainty based annotation error fixing for web attack detection

X Gong, J Lu, Y Zhou, H Qiu, R He - Journal of Signal Processing Systems, 2021 - Springer
Deep learning (DL) techniques have been widely used in web attack detection domain. With
the stronger ability to fit data, DL models are also more sensitive to the training data …