Intelligent detection and recovery from cyberattacks for small and medium-sized enterprises
MÁ López, JML Enríquez, M López, CMA Jiménez… - IJIMAI, 2020 - dialnet.unirioja.es
Cyberattacks threaten continuously computer security in companies. These attacks evolve
everyday, being more and more sophisticated and robust. In addition, they take advantage …
everyday, being more and more sophisticated and robust. In addition, they take advantage …
Unaware, Unfunded and Uneducated: A Systematic Review of SME Cybersecurity
Small and Medium Enterprises (SMEs) are pivotal in the global economy, accounting for
over 90% of businesses and 60% of employment worldwide. Despite their significance …
over 90% of businesses and 60% of employment worldwide. Despite their significance …
[BOOK][B] Towards effective wireless intrusion detection using AWID dataset
DLR Wilson - 2021 - search.proquest.com
In the field of network security, intrusion detection system plays a vital role in the procedure
of applying machine learning (ML) techniques with the dataset. This study is an IDS related …
of applying machine learning (ML) techniques with the dataset. This study is an IDS related …
Data-Driven Techniques for Intrusion Detection in Wireless Networks
In a wireless network, there is typically a large amount of data being exchanged over the
network. Having sensitive information about users and network analytics leads to the idea of …
network. Having sensitive information about users and network analytics leads to the idea of …
Impact of High Dimensionality Reduction in Financial Datasets of SMEs with Feature Pre-processing in Data Mining
R Mahalingam, K Jayanthi - Proceedings of Fourth International …, 2023 - Springer
Abstract High Data Dimensionality Reduction (HDDR) removes the irrelevant features in a
complex dataset and incorporates various techniques that could be used to foretell the …
complex dataset and incorporates various techniques that could be used to foretell the …
7 Data-Driven Techniques
Data-driven approaches refer to the use of available data within a network for analysis and
detection of unwanted traffic and to distinguish normal behavior from attack behavior. Using …
detection of unwanted traffic and to distinguish normal behavior from attack behavior. Using …
CYBER SECURITY IN SMALL AND MEDIUM ENTERPRISES
M Mburu - 2023 - diva-portal.org
The Internet has evolved over the years. Businesses and individuals have leveraged it to run
their daily activities to make everything easier. Almost every business has a digital footprint …
their daily activities to make everything easier. Almost every business has a digital footprint …
Cybersecurity for Small and Medium-Sized Businesses
OA Luukkonen, YÜ Sönmez - Journal of Sustainable Economics …, 2022 - dergipark.org.tr
Cybersecurity is all the devices and software applications that protect computers, networks,
software, critical systems, and data from possible digital threats. The organizations have a …
software, critical systems, and data from possible digital threats. The organizations have a …
Survey on Machine Learning Approaches for Intrusion Detection System
Z Garcia, C Kavitha - Proceedings of the First International Conference on …, 2021 - eudl.eu
Wireless connectivity is easy available and low cost. Wireless networks are widely regarded
as the most convenient and unavoidable in modern life. So, massive boom of information's …
as the most convenient and unavoidable in modern life. So, massive boom of information's …
Towards effective wireless intrusion detection using AWID dataset
DL Robert Wilson - 2021 - repository.rit.edu
In the field of network security, intrusion detection system plays a vital role in the procedure
of applying machine learning (ML) techniques with the dataset. This study is an IDS related …
of applying machine learning (ML) techniques with the dataset. This study is an IDS related …