Machine learning for intelligent data analysis and automation in cybersecurity: current and future prospects

IH Sarker - Annals of Data Science, 2023 - Springer
Due to the digitization and Internet of Things revolutions, the present electronic world has a
wealth of cybersecurity data. Efficiently resolving cyber anomalies and attacks is becoming a …

[HTML][HTML] A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques

TS Riera, JRB Higuera, JB Higuera, JJM Herraiz… - Computers & …, 2022 - Elsevier
Context There are many datasets for training and evaluating models to detect web attacks,
labeling each request as normal or attack. Web attack protection tools must provide …

Robust data driven analysis for electricity theft attack-resilient power grid

IU Khan, N Javaid, CJ Taylor… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The role of electricity theft detection (ETD) is critical to maintain cost-efficiency in smart grids.
However, existing ETD methods cannot efficiently handle the sheer volume of data now …

Big data analytics for identifying electricity theft using machine learning approaches in microgrids for smart communities

A Arif, N Javaid, A Aldegheishem… - Concurrency and …, 2021 - Wiley Online Library
Electricity theft (ET) causes major revenue loss in power utilities. It reduces the quality of
supply, raises production cost, causes legal consumers to pay the higher cost, and impacts …

Brightbox—a rough set based technology for diagnosing mistakes of machine learning models

A Janusz, A Zalewska, Ł Wawrowski, P Biczyk… - Applied Soft …, 2023 - Elsevier
The paper presents a novel approach to investigating mistakes in machine learning model
operations. The considered approach is the basis for BrightBox–a diagnostic technology that …

Zero-touch security management for mMTC network slices: DDoS attack detection and mitigation

R Niboucha, SB Saad, A Ksentini… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Massive machine-type communications (mMTCs) network slices in 5G aim to connect a
massive number of MTC devices, opening the door for a widened attack surface. Network …

IEEE BigData 2019 cup: Suspicious network event recognition

A Janusz, D Kałuza… - … Conference on Big …, 2019 - ieeexplore.ieee.org
“IEEE BigData 2019 Cup: Suspicious Network Event Recognition” was a data mining
competition organized jointly by companies Security On-Demand and QED Software at the …

IoT Device Identification and Cybersecurity: Advancements, Challenges, and an LSTM-MLP Solution

SA Alshaya - Engineering, Technology & Applied Science Research, 2023 - etasr.com
Over the past few years, there has been an undeniable surge in the deployment of IoT
devices. However, this rapid growth has brought new challenges in cybersecurity, as …

Navigating the Complexities of Cyber Threats, Sentiment, and Health with AI/ML

M Sarisa, VN Boddapati, GK Patra, C Kuraku… - JOURNAL OF RECENT …, 2020 - jrtcse.com
When it comes to interactions that occur in the contemporary global environment
characterized by increased use of computers and information technology, cybersecurity …

A combination of general and specific models to predict victories in video games

QH Vu, D Ruta, L Cen, M Liu - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
At anytime in a tactics game, given the current status of the game players, it's always
interesting to predict who is going to win the game in the end. This is the challenge defined …