Machine learning for anomaly detection: A systematic review

AB Nassif, MA Talib, Q Nasir, FM Dakalbab - Ieee Access, 2021 - ieeexplore.ieee.org
Anomaly detection has been used for decades to identify and extract anomalous
components from data. Many techniques have been used to detect anomalies. One of the …

A survey of random forest based methods for intrusion detection systems

PAA Resende, AC Drummond - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Over the past decades, researchers have been proposing different Intrusion Detection
approaches to deal with the increasing number and complexity of threats for computer …

Hate speech detection: Challenges and solutions

S MacAvaney, HR Yao, E Yang, K Russell, N Goharian… - PloS one, 2019 - journals.plos.org
As online content continues to grow, so does the spread of hate speech. We identify and
examine challenges faced by online automatic approaches for hate speech detection in text …

On the feasibility of deep learning in sensor network intrusion detection

S Otoum, B Kantarci, HT Mouftah - IEEE Networking Letters, 2019 - ieeexplore.ieee.org
In this letter, we present a comprehensive analysis of the use of machine and deep learning
(DL) solutions for IDS systems in wireless sensor networks (WSNs). To accomplish this, we …

Intrusion detection based on autoencoder and isolation forest in fog computing

K Sadaf, J Sultana - IEEE Access, 2020 - ieeexplore.ieee.org
Fog Computing has emerged as an extension to cloud computing by providing an efficient
infrastructure to support IoT. Fog computing acting as a mediator provides local processing …

A brief survey of machine learning methods and their sensor and IoT applications

US Shanthamallu, A Spanias… - … & Applications (IISA), 2017 - ieeexplore.ieee.org
This paper provides a brief survey of the basic concepts and algorithms used for Machine
Learning and its applications. We begin with a broader definition of machine learning and …

A stacking ensemble for network intrusion detection using heterogeneous datasets

S Rajagopal, PP Kundapur… - Security and …, 2020 - Wiley Online Library
The problem of network intrusion detection poses innumerable challenges to the research
community, industry, and commercial sectors. Moreover, the persistent attacks occurring on …

Shallow and deep networks intrusion detection system: A taxonomy and survey

E Hodo, X Bellekens, A Hamilton, C Tachtatzis… - ar** study and cross-benchmark evaluation
BA Tama, S Lim - Computer Science Review, 2021 - Elsevier
Intrusion detection systems (IDSs) are intrinsically linked to a comprehensive solution of
cyberattacks prevention instruments. To achieve a higher detection rate, the ability to design …

Machine learning for cloud security: a systematic review

AB Nassif, MA Talib, Q Nasir, H Albadani… - IEEE …, 2021 - ieeexplore.ieee.org
The popularity and usage of Cloud computing is increasing rapidly. Several companies are
investing in this field either for their own use or to provide it as a service for others. One of …