Dataset analysis and feature characteristics to predict rice production based on eXtreme gradient boosting

EB Wijayanti, DRIM Setiadi… - Journal of Computing …, 2024 - dl.futuretechsci.org
Rice plays a vital role as the main food source for almost half of the global population,
contributing more than 21% of the total calories humans need. Production predictions are …

A detailed review on enhancing the security in Internet of Things-Based Smart City Environment using Machine learning algorithms

A Muniswamy, R Rathi - IEEE Access, 2024 - ieeexplore.ieee.org
Over the past few years, smart cities have seamlessly integrated into our daily lives, offering
convenience and simplicity. However, as these cities become increasingly interconnected …

Android ransomware detection using supervised machine learning techniques based on traffic analysis

A Albin Ahmed, A Shaahid, F Alnasser, S Alfaddagh… - Sensors, 2023 - mdpi.com
In today's digitalized era, the usage of Android devices is being extensively witnessed in
various sectors. Cybercriminals inevitably adapt to new security technologies and utilize …

Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive Cybersecurity

P Dini, S Saponara - Sensors, 2023 - mdpi.com
In recent decades, an exponential surge in technological advancements has significantly
transformed various aspects of daily life. The proliferation of indispensable objects such as …

Investigating the impact of feature selection on adversarial transferability in intrusion detection system

JM Adeke, G Liu, L Amoah, OJ Nwali - Computers & Security, 2025 - Elsevier
Adversarial attacks pose a serious threat to cybersecurity systems, particularly intrusion
detection systems (IDSs). The property of transferability exacerbates this threat, as attacks …

Random Under Sampling for Performance Improvement in Attack Detection on Internet of Vehicles Using Machine Learning

MAN Anargya, W Ghozi… - Jurnal Informatika …, 2025 - ejournal.poltekharber.ac.id
Abstract The Internet of Vehicles (IoV) technology is one of the advancements derived from
the Internet of Things (IoT) in the transportation sector, benefiting its users. However, the …

Featured Papers on Network Security and Privacy

J Mongay Batalla - Journal of Sensor and Actuator Networks, 2024 - mdpi.com
There is an urgent need to introduce security-by-design in networks. Security-bydesign is a
way to build a network where security is considered holistically in the whole network from its …

IoT Attacks Detection Using Supervised Machine Learning Techniques

M Aljabri, A Shaahid, F Alnasser… - HighTech and …, 2024 - hightechjournal.org
In recent times, the growing significance of Internet of Things (IoT) devices in people's lives
is undeniable, driven by their myriad benefits. However, these devices confront …

[PDF][PDF] Insights of machine learning-based threat identification schemes in advanced network system

T Narasimhamurthy, GH Swamy - International Journal of Electrical …, 2024 - academia.edu
An advanced network system (ANS) is characterized by extensive communication features
that can support a sophisticated collaborative network structure. This is essential to hosting …

Machine Learning for Intrusion Detection Systems: A Systematic Literature Review

D Stewart, T Kolajo, O Daramola - Proceedings of the Future Technologies …, 2024 - Springer
As the world continues to digitise, the threat of cyberattacks increases. Cyber-attacks are
becoming more common and complex, making them more difficult to detect and prevent …