Cyber warfare threat categorization on cps by dark web terrorist

V Mahor, R Rawat, A Kumar… - 2021 IEEE 4th …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) also referred as Cyber Physical Systems (CPS) as
critical elements, expected to play a key role in Industry 4.0 and always been vulnerable to …

A Comprehensive Review of Anomaly Detection in Web Logs

M Majd, P Najafi, SA Alhosseini… - 2022 IEEE/ACM …, 2022 - ieeexplore.ieee.org
Anomaly detection is a significant problem that has been researched within diverse research
areas and application domains, especially in the area of web-based internet services or …

Improving efficiency of web application firewall to detect code injection attacks with random forest method and analysis attributes HTTP request

NM Thang - Programming and Computer Software, 2020 - Springer
In the era of information technology, the use of computer technology for both work and
personal use is growing rapidly with time. Unfortunately, with the increasing number and …

Exploring natural language processing methods for interactive behaviour modelling

G Zhang, M Bortoletto, Z Hu, L Shi, M Bâce… - IFIP Conference on …, 2023 - Springer
Analysing and modelling interactive behaviour is an important topic in human-computer
interaction (HCI) and a key requirement for the development of intelligent interactive …

Exploiting web content semantic features to detect web robots from weblogs

RR Jagat, DS Sisodia, P Singh - Journal of Network and Computer …, 2024 - Elsevier
Nowadays, web robots are predominantly used for auto-accessing web content, sharing
almost one-third of the total web traffic and often posing threats to various web applications' …

[HTML][HTML] Analysis of Hadoop log file in an environment for dynamic detection of threats using machine learning

KB Naidu, BR Prasad, SM Hassen, C Kaur… - Measurement …, 2022 - Elsevier
Log files are a significant piece of records that once properly analyzed, can yield helpful
information. The usage of cloud services for log analysis is almost inevitable due to the …

An integrated framework for web data preprocessing towards modeling user behavior

NM Ali, AM Gadallah, HA Hefny… - 2020 International Multi …, 2020 - ieeexplore.ieee.org
Extracting useful and relevant information from the massive amount of data by web users
becomes a challenging task. This work regarding applications based on the use of Web …

No features needed: Using bpe sequence embeddings for web log anomaly detection

NS Sehwani - Proceedings of the 2022 ACM on International …, 2022 - dl.acm.org
Problem: Manual data analysis for extracting useful features in web log anomaly detection
can be costly and time-consuming. Automated techniques on the other hand (eg Auto …

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击 GRADUATE SCHOOL

DY DEMIREL - 2024 - polen.itu.edu.tr
Security, in the context of web-based applications, has become increasingly critical as
consumers and businesses worldwide store sensitive information online. To safeguard this …

Web Attack Classification via WAF Log Analysis: AutoML, CNN, RNN, ALBERT

Y Jo, J Park, ML Han - Journal of the Korea Institute of Information …, 2024 - koreascience.kr
Abstract Cyber Attack and Cyber Threat are getting confused and evolved. Therefore, using
AI (Artificial Intelligence), which is the most important technology in Fourth Industry …