Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

Cybersecurity in big data era: From securing big data to data-driven security

DB Rawat, R Doku, M Garuba - IEEE Transactions on Services …, 2019 - ieeexplore.ieee.org
''Knowledge is power” is an old adage that has been found to be true in today's information
age. Knowledge is derived from having access to information. The ability to gather …

[HTML][HTML] Toward develo** efficient Conv-AE-based intrusion detection system using heterogeneous dataset

MA Khan, J Kim - Electronics, 2020 - mdpi.com
Recently, due to the rapid development and remarkable result of deep learning (DL) and
machine learning (ML) approaches in various domains for several long-standing artificial …

Big data analytics for network anomaly detection from netflow data

DS Terzi, R Terzi, S Sagiroglu - 2017 International Conference …, 2017 - ieeexplore.ieee.org
Cyber-attacks was organized in a simple and random way in the past. However attacks are
carried out systematically and long term nowadays. In addition, the high calculation volume …

A survey on various security protocols of edge computing

T Bhattacharya, AV Peddi, S Ponaganti… - The Journal of …, 2025 - Springer
Edge computing has emerged as a transformative data processing method by decentralizing
computations and bringing them toward the data source, significantly reducing latency and …

[HTML][HTML] Knowledge absorption for cyber-security: The role of human beliefs

DP David, MM Keupp, A Mermoud - Computers in Human Behavior, 2020 - Elsevier
We investigate how human beliefs are associated with the absorption of specialist
knowledge that is required to produce cyber-security. We ground our theorizing in the …

Stream-based machine learning for network security and anomaly detection

P Mulinka, P Casas - Proceedings of the 2018 workshop on big data …, 2018 - dl.acm.org
Data Stream Machine Learning is rapidly gaining popularity within the network monitoring
community as the big data produced by network devices and end-user terminals goes …

Deep in the dark-deep learning-based malware traffic detection without expert knowledge

G Marín, P Casas… - 2019 IEEE Security and …, 2019 - ieeexplore.ieee.org
With the ever-growing occurrence of networking attacks, robust network security systems are
essential to prevent and mitigate their harming effects. In recent years, machine learning …

Comparative study between big data analysis techniques in intrusion detection

M Hafsa, F Jemili - Big Data and Cognitive Computing, 2018 - mdpi.com
Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in
2019 and that a business will fall victim to a cyber-attack every 14 seconds. Notice here that …

The concept of detecting and classifying anomalies in large data sets on a basis of information granules

A Kiersztyn, P Karczmarek, K Kiersztyn… - … Conference on Fuzzy …, 2020 - ieeexplore.ieee.org
Anomaly (outlier) detection is one of the most important problems of modern data analysis.
Anomalies can be the results of database users' mistakes, operational errors or just missing …