A survey on representation learning efforts in cybersecurity domain

M Usman, MA Jan, X He, J Chen - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
In this technology-based era, network-based systems are facing new cyber-attacks on daily
bases. Traditional cybersecurity approaches are based on old threat-knowledge databases …

A survey of neural networks usage for intrusion detection systems

A Drewek-Ossowicka, M Pietrołaj… - Journal of Ambient …, 2021 - Springer
In recent years, advancements in the field of the artificial intelligence (AI) gained a huge
momentum due to the worldwide appliance of this technology by the industry. One of the …

A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position

J Liang, J Chen, Y Zhu, R Yu - Applied Soft Computing, 2019 - Elsevier
Vehicle ad hoc networks (VANETs) have attracted great interests from both industry and
academia, but a number of issues, particularly security, have not been readily addressed …

Machine intelligence-based algorithms for spam filtering on document labeling

D Gaurav, SM Tiwari, A Goyal, N Gandhi, A Abraham - Soft Computing, 2020 - Springer
The internet has provided numerous modes for secure data transmission from one end
station to another, and email is one of those. The reason behind its popular usage is its cost …

Security issues and challenges of big data analytics and visualization

BB Jayasingh, MR Patra… - 2016 2nd international …, 2016 - ieeexplore.ieee.org
The big data environment supports to resolve the issues of cyber security in terms of finding
the attacker. There are security challenges of big data as well as security issues the analyst …

[HTML][HTML] A novel intrusion detection approach using machine learning ensemble for IoT environments

P Verma, A Dumka, R Singh, A Ashok, A Gehlot… - Applied Sciences, 2021 - mdpi.com
The Internet of Things (IoT) has gained significant importance due to its applicability in
diverse environments. Another reason for the influence of the IoT is its use of a flexible and …

Network forensics: an analysis of techniques, tools, and trends

R Hunt, S Zeadally - Computer, 2012 - ieeexplore.ieee.org
Network Forensics – An Analysis of Techniques, Tools, and Trends Page 1 1 Network
Forensics – An Analysis of Techniques, Tools, and Trends Ray Hunt Department of …

Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection

M Di Mauro, C Di Sarno - Journal of information security and applications, 2018 - Elsevier
Abstract Nowadays, the Security Information and Event Management (SIEM) systems take
on great relevance in handling security issues for critical infrastructures as Internet Service …

Sustainability of machine learning models: An energy consumption centric evaluation

MS Islam, SN Zisad, AL Kor… - … Conference on Electrical …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) algorithms have become prevalent in today's digital world. However,
training, testing and deployment of ML models consume a lot of energy, particularly when …

Italian text categorization with lemmatization and support vector machines

F Camastra, G Razi - Neural approaches to dynamics of signal exchanges, 2020 - Springer
The paper describes an Italian language text categorizer by Lemmatization and support
vector machines. The categorizer is composed of six modules. The first module performs the …