Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects
IH Sarker - Annals of Data Science, 2023 - Springer
Due to the digitization and Internet of Things revolutions, the present electronic world has a
wealth of cybersecurity data. Efficiently resolving cyber anomalies and attacks is becoming a …
wealth of cybersecurity data. Efficiently resolving cyber anomalies and attacks is becoming a …
Machine learning for wireless sensor networks security: An overview of challenges and issues
Energy and security are major challenges in a wireless sensor network, and they work
oppositely. As security complexity increases, battery drain will increase. Due to the limited …
oppositely. As security complexity increases, battery drain will increase. Due to the limited …
Outlier detection using isolation forest and local outlier factor
Z Cheng, C Zou, J Dong - Proceedings of the conference on research in …, 2019 - dl.acm.org
Outlier detection, also named as anomaly detection, is one of the hot issues in the field of
data mining. As well-known outlier detection algorithms, Isolation Forest (iForest) and Local …
data mining. As well-known outlier detection algorithms, Isolation Forest (iForest) and Local …
IoT based real-time river water quality monitoring system
Current water quality monitoring system is a manual system with a monotonous process and
is very time-consuming. This paper proposes a sensor-based water quality monitoring …
is very time-consuming. This paper proposes a sensor-based water quality monitoring …
Anomaly detection, analysis and prediction techniques in iot environment: A systematic literature review
Anomaly detection has attracted considerable attention from the research community in the
past few years due to the advancement of sensor monitoring technologies, low-cost …
past few years due to the advancement of sensor monitoring technologies, low-cost …
Multi‐aspects AI‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview
IH Sarker - Security and Privacy, 2023 - Wiley Online Library
Due to the rising dependency on digital technology, cybersecurity has emerged as a more
prominent field of research and application that typically focuses on securing devices …
prominent field of research and application that typically focuses on securing devices …
[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical …
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …
and services that are vital for the functioning and well-being of a society, economy, or nation …
Static hand gesture recognition using convolutional neural network with data augmentation
Computer is a part and parcel in our day to day life and used in various fields. The
interaction of human and computer is accomplished by conventional input devices like …
interaction of human and computer is accomplished by conventional input devices like …
Machine learning with Belief Rule-Based Expert Systems to predict stock price movements
Price prediction of financial assets has been a key interest for researchers over the decades.
Numerous techniques to predict the price movements have been developed by the …
Numerous techniques to predict the price movements have been developed by the …
Review of transit data sources: potentials, challenges and complementarity
Public transport has become one of the major transport options, especially when it comes to
reducing motorized individual transport and achieving sustainability while reducing …
reducing motorized individual transport and achieving sustainability while reducing …