[HTML][HTML] An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0
Cybersecurity attacks that target software have become profitable and popular targets for
cybercriminals who consciously take advantage of web-based vulnerabilities and execute …
cybercriminals who consciously take advantage of web-based vulnerabilities and execute …
SWAF: a smart web application firewall based on convolutional neural network
Internet network carries a huge stream of HTTP requests and responses between users and
servers. Securing server data access is primordial for internet users to enhance confidence …
servers. Securing server data access is primordial for internet users to enhance confidence …
An explainable machine learning-based web attack detection system for industrial IoT web application security
ABSTRACT Within Industry 4.0, the integration of Industrial IoT (IIoT) marks a transformative
phase for modern industries, fostering the development of smart factories and intelligent …
phase for modern industries, fostering the development of smart factories and intelligent …
Cybersecurity effectiveness: The role of internal auditor certification, risk assessment and senior management
This study aims to analyze and examine the influence of internal auditor certification, risk
assessment, and the role of senior management on the effectiveness of cybersecurity for …
assessment, and the role of senior management on the effectiveness of cybersecurity for …
Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks
Web applications remain a significant attack vector for cybercriminals seeking to exploit
application vulnerabilities and gain unauthorized access to privileged data. In this research …
application vulnerabilities and gain unauthorized access to privileged data. In this research …
Comparative analysis of machine learning classifiers for enhancing business revenue and customer satisfaction: An empirical study
Maximizing profits while maintaining a strong position in the market is the primary goal of
every business. High revenue and market dominance can only be achieved with an in-depth …
every business. High revenue and market dominance can only be achieved with an in-depth …
MULTI-KEY FULLY HOMOMORPHIC ENCRYPTION FOR PRIVACY-PRESERVATION WITHIN FEDERATED LEARNING ENVIRONMENTS
Despite the need for data from multiple sources in machine learning, privacy constraints limit
data sharing. Federated Learning (FL) addresses this by allowing clients to share locally …
data sharing. Federated Learning (FL) addresses this by allowing clients to share locally …
Detection of web-based attacks using tree-based learning models: An evaluation study
Due to the increasing complexity of web-based attacks, their detection has become more
challenging in recent years. Relying solely on traditional intrusion detection systems may no …
challenging in recent years. Relying solely on traditional intrusion detection systems may no …
Laboratory LIMATI, FPBM, USMS, Beni Mellal, Morocco oumaima. chakirfpb@ usms. ac. ma, y. sadqi@ usms. ma
O Chakir - … Intelligence and Green Computing: Proceedings of …, 2023 - books.google.com
Due to the increasing complexity of web-based attacks, their detection has become more
challenging in recent years. Relying solely on traditional intrusion detection systems may no …
challenging in recent years. Relying solely on traditional intrusion detection systems may no …
[CITATION][C] Develo** an Innovative Network Security Attack Detection Model Through Artificial Intelligence and Edge Computing
Y Zhuang - SPIN, 2024 - World Scientific
Securing a network at its edge, that is, the location where a user creates and stores data
within a larger network is defined as edge security. It is essential to have this type of …
within a larger network is defined as edge security. It is essential to have this type of …