[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

[HTML][HTML] Evolving techniques in cyber threat hunting: A systematic review

A Mahboubi, K Luong, H Aboutorab, HT Bui… - Journal of Network and …, 2024 - Elsevier
In the rapidly changing cybersecurity landscape, threat hunting has become a critical
proactive defense against sophisticated cyber threats. While traditional security measures …

Machine learning schemes for anomaly detection in solar power plants

M Ibrahim, A Alsheikh, FM Awaysheh, MD Alshehri - Energies, 2022 - mdpi.com
The rapid industrial growth in solar energy is gaining increasing interest in renewable power
from smart grids and plants. Anomaly detection in photovoltaic (PV) systems is a demanding …

LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT

D Han, HX Zhou, TH Weng, Z Wu, B Han, KC Li… - Telecommunication …, 2023 - Springer
As widely known, most of the Internet of Things (IoT) devices own small storage and
constrained computing power, and hence, their poor security evaluation capabilities make …

Security and privacy for low power iot devices on 5g and beyond networks: Challenges and future directions

J Cook, SU Rehman, MA Khan - IEEE Access, 2023 - ieeexplore.ieee.org
The growth in the use of small sensor devices, commonly known as the Internet of Things
(IoT), has resulted in unprecedented amounts of data being generated and captured. With …

[PDF][PDF] Cybersecurity Meets Data Science: A Fusion of Disciplines for Enhanced Threat Protection

MS Hosen, MA Al Mamun, S Khandakar… - Nanotechnology …, 2024 - researchgate.net
Nanotechnology Perceptions Vol. 20 No. S10 (2024) fully solved include issues on data
quality and data privacy, issues on model stability and false positives and negatives. Cyber …

Explainable AI-based innovative hybrid ensemble model for intrusion detection

U Ahmed, Z Jiangbin, A Almogren, S Khan… - Journal of Cloud …, 2024 - Springer
Cybersecurity threats have become more worldly, demanding advanced detection
mechanisms with the exponential growth in digital data and network services. Intrusion …

[HTML][HTML] Using machine learning for detecting liquidity risk in banks

RI Barongo, JT Mbelwa - Machine Learning with Applications, 2024 - Elsevier
The accurate classification of banks' Liquidity Risk (LR) for regulatory supervision is
hindered by limitations in the measures, such as Minimum Liquid Assets (MLA), Net-Stable …

Design and implementation of an anomaly network traffic detection model integrating temporal and spatial features

M Li, D Han, X Yin, H Liu, D Li - Security and Communication …, 2021 - Wiley Online Library
With the rapid development and widespread application of cloud computing, cloud
computing open networks and service sharing scenarios have become more complex and …

Vegetable plant leaf image classification using machine learning models

C Kumar, V Kumar - Proceedings of Third International Conference on …, 2023 - Springer
Vegetables are rich in minerals, vitamins, and calcium. It benefits our body in many ways. To
know about the vegetable, firstly need to identify and their classification. The identification of …