[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …
indicating an increase of more than 50% since 2018. With the average cyber insurance …
[HTML][HTML] Evolving techniques in cyber threat hunting: A systematic review
In the rapidly changing cybersecurity landscape, threat hunting has become a critical
proactive defense against sophisticated cyber threats. While traditional security measures …
proactive defense against sophisticated cyber threats. While traditional security measures …
Machine learning schemes for anomaly detection in solar power plants
The rapid industrial growth in solar energy is gaining increasing interest in renewable power
from smart grids and plants. Anomaly detection in photovoltaic (PV) systems is a demanding …
from smart grids and plants. Anomaly detection in photovoltaic (PV) systems is a demanding …
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT
As widely known, most of the Internet of Things (IoT) devices own small storage and
constrained computing power, and hence, their poor security evaluation capabilities make …
constrained computing power, and hence, their poor security evaluation capabilities make …
Security and privacy for low power iot devices on 5g and beyond networks: Challenges and future directions
The growth in the use of small sensor devices, commonly known as the Internet of Things
(IoT), has resulted in unprecedented amounts of data being generated and captured. With …
(IoT), has resulted in unprecedented amounts of data being generated and captured. With …
[PDF][PDF] Cybersecurity Meets Data Science: A Fusion of Disciplines for Enhanced Threat Protection
Nanotechnology Perceptions Vol. 20 No. S10 (2024) fully solved include issues on data
quality and data privacy, issues on model stability and false positives and negatives. Cyber …
quality and data privacy, issues on model stability and false positives and negatives. Cyber …
Explainable AI-based innovative hybrid ensemble model for intrusion detection
U Ahmed, Z Jiangbin, A Almogren, S Khan… - Journal of Cloud …, 2024 - Springer
Cybersecurity threats have become more worldly, demanding advanced detection
mechanisms with the exponential growth in digital data and network services. Intrusion …
mechanisms with the exponential growth in digital data and network services. Intrusion …
[HTML][HTML] Using machine learning for detecting liquidity risk in banks
RI Barongo, JT Mbelwa - Machine Learning with Applications, 2024 - Elsevier
The accurate classification of banks' Liquidity Risk (LR) for regulatory supervision is
hindered by limitations in the measures, such as Minimum Liquid Assets (MLA), Net-Stable …
hindered by limitations in the measures, such as Minimum Liquid Assets (MLA), Net-Stable …
Design and implementation of an anomaly network traffic detection model integrating temporal and spatial features
With the rapid development and widespread application of cloud computing, cloud
computing open networks and service sharing scenarios have become more complex and …
computing open networks and service sharing scenarios have become more complex and …
Vegetable plant leaf image classification using machine learning models
C Kumar, V Kumar - Proceedings of Third International Conference on …, 2023 - Springer
Vegetables are rich in minerals, vitamins, and calcium. It benefits our body in many ways. To
know about the vegetable, firstly need to identify and their classification. The identification of …
know about the vegetable, firstly need to identify and their classification. The identification of …