A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Optimization Techniques in Cooperative and Distributed MAC Protocols: A Survey

R Subramanyam, S Rekha… - International Journal of …, 2024 - igi-global.com
The tremendous increase in wireless network application finds distributed allocation of
resources allocation very useful in the network. Packet delivery ratio and delay can be …

Detection of the cyber network attack using robust random forest in a big data environment

SS Ahmad, R Rani, EA Ali, I Wattar - AIP Conference Proceedings, 2023 - pubs.aip.org
Our civilization has entered an era of" knowledge revolution" due to the fast advancement
and widespread use of IT and the Internet. Moreover, as network traffic grows and becomes …

Research on Internet Security Big Data Protection Technology and Model Simulation Design Based on Deep Learning

X Gao, W Ma, H Liu, J Wang - 2023 International Conference …, 2023 - ieeexplore.ieee.org
With the increasing threat of network attacks to network information systems, we need to take
more active internet security protection technologies to meet the growing demand for …

[CITATION][C] Machine Learning Mechanisms for Cyber Security and Botnet Networks

MSS Bhuite, MPP Kalyankar