A survey on machine learning techniques for cyber security in the last decade
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
Optimization Techniques in Cooperative and Distributed MAC Protocols: A Survey
R Subramanyam, S Rekha… - International Journal of …, 2024 - igi-global.com
The tremendous increase in wireless network application finds distributed allocation of
resources allocation very useful in the network. Packet delivery ratio and delay can be …
resources allocation very useful in the network. Packet delivery ratio and delay can be …
Detection of the cyber network attack using robust random forest in a big data environment
SS Ahmad, R Rani, EA Ali, I Wattar - AIP Conference Proceedings, 2023 - pubs.aip.org
Our civilization has entered an era of" knowledge revolution" due to the fast advancement
and widespread use of IT and the Internet. Moreover, as network traffic grows and becomes …
and widespread use of IT and the Internet. Moreover, as network traffic grows and becomes …
Research on Internet Security Big Data Protection Technology and Model Simulation Design Based on Deep Learning
X Gao, W Ma, H Liu, J Wang - 2023 International Conference …, 2023 - ieeexplore.ieee.org
With the increasing threat of network attacks to network information systems, we need to take
more active internet security protection technologies to meet the growing demand for …
more active internet security protection technologies to meet the growing demand for …
[CITATION][C] Machine Learning Mechanisms for Cyber Security and Botnet Networks
MSS Bhuite, MPP Kalyankar