• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4681874)   Today's Articles (298)
For: Martínez Torres J, Iglesias Comesaña C, García-Nieto PJ. Review: machine learning techniques applied to cybersecurity. INT J MACH LEARN CYB 2019. [DOI: 10.1007/s13042-018-00906-1] [Citation(s) in RCA: 47] [Impact Index Per Article: 7.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
Number Cited by Other Article(s)
1
Victor de Sousa Dutra J, Salles MO, Michel RC, Vale DL. Computer vision with artificial intelligence for a fast, low-cost, eco-friendly and accurate prediction of beer styles and brands. ANALYTICAL METHODS : ADVANCING METHODS AND APPLICATIONS 2024;16:4285-4290. [PMID: 38884156 DOI: 10.1039/d4ay00617h] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/18/2024]
2
Tehrani MG, Sultanow E, Buchanan WJ, Amir M, Jeschke A, Houmani M, Chow R, Lemoudden M. Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection. Sci Rep 2024;14:1732. [PMID: 38242968 PMCID: PMC10799075 DOI: 10.1038/s41598-024-51941-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/11/2023] [Accepted: 01/11/2024] [Indexed: 01/21/2024]  Open
3
Singh AB, Singh KM. Application of error level analysis in image spam classification using deep learning model. PLoS One 2023;18:e0291037. [PMID: 38096218 PMCID: PMC10720999 DOI: 10.1371/journal.pone.0291037] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/08/2022] [Accepted: 08/20/2023] [Indexed: 12/17/2023]  Open
4
Ma KWF, Dhot T, Raza M. Considerations for Using Artificial Intelligence to Manage Authorized Push Payment (APP) Scams. IEEE ENGINEERING MANAGEMENT REVIEW 2023;51:166-179. [DOI: 10.1109/emr.2023.3288432] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/04/2025]
5
Liu Z, Leung CS, So HC. Formal Convergence Analysis on Deterministic 1-Regularization based Mini-Batch Learning for RBF Networks. Neurocomputing 2023. [DOI: 10.1016/j.neucom.2023.02.012] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/18/2023]
6
Negera WG, Schwenker F, Debelee TG, Melaku HM, Ayano YM. Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning. SENSORS (BASEL, SWITZERLAND) 2022;22:9837. [PMID: 36560204 PMCID: PMC9787631 DOI: 10.3390/s22249837] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/26/2022] [Revised: 12/07/2022] [Accepted: 12/10/2022] [Indexed: 06/17/2023]
7
Koay AMY, Ko RKL, Hettema H, Radke K. Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges. J Intell Inf Syst 2022. [DOI: 10.1007/s10844-022-00753-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
8
Okey OD, Maidin SS, Adasme P, Lopes Rosa R, Saadi M, Carrillo Melgarejo D, Zegarra Rodríguez D. BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning. SENSORS (BASEL, SWITZERLAND) 2022;22:7409. [PMID: 36236506 PMCID: PMC9572777 DOI: 10.3390/s22197409] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/08/2022] [Revised: 09/19/2022] [Accepted: 09/22/2022] [Indexed: 06/16/2023]
9
Smaili N, Radu C, Khalili A. Board effectiveness and cybersecurity disclosure. JOURNAL OF MANAGEMENT & GOVERNANCE 2022. [DOI: 10.1007/s10997-022-09637-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/17/2022]
10
Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review. FUTURE INTERNET 2022. [DOI: 10.3390/fi14040118] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/01/2023]  Open
11
Wong HT, Leung CS, Kwong S. Convergence analysis on the deterministic mini-batch learning algorithm for noise resilient radial basis function networks. INT J MACH LEARN CYB 2022. [DOI: 10.1007/s13042-022-01550-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
12
Rehman E, Haseeb-ud-Din M, Malik AJ, Khan TK, Abbasi AA, Kadry S, Khan MA, Rho S. RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. THE JOURNAL OF SUPERCOMPUTING 2022;78:8890-8924. [DOI: 10.1007/s11227-021-04188-3] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 11/02/2021] [Indexed: 08/25/2024]
13
Debb SM, McClellan MK. Perceived Vulnerability As a Determinant of Increased Risk for Cybersecurity Risk Behavior. CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING 2021;24:605-611. [PMID: 34534014 DOI: 10.1089/cyber.2021.0043] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/13/2022]
14
Pascual-Triana JD, Charte D, Andrés Arroyo M, Fernández A, Herrera F. Revisiting data complexity metrics based on morphology for overlap and imbalance: snapshot, new overlap number of balls metrics and singular problems prospect. Knowl Inf Syst 2021. [DOI: 10.1007/s10115-021-01577-1] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
15
Identification of the Critical Factors for Global Supply Chain Management under the COVID-19 Outbreak via a Fusion Intelligent Decision Support System. AXIOMS 2021. [DOI: 10.3390/axioms10020061] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
16
Carrizosa E, Molero-Río C, Romero Morales D. Mathematical optimization in classification and regression trees. TOP (BERLIN, GERMANY) 2021;29:5-33. [PMID: 38624654 PMCID: PMC7967110 DOI: 10.1007/s11750-021-00594-1] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/10/2020] [Accepted: 01/27/2021] [Indexed: 06/02/2023]
17
Chan PP, Luo F, Chen Z, Shu Y, Yeung DS. Transfer learning based countermeasure against label flipping poisoning attack. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.10.016] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
18
Wang Q, Zhao H, Hu Z, Chen Y, Li Y. Discrete convolutional CRF networks for depth estimation from monocular infrared images. INT J MACH LEARN CYB 2021. [DOI: 10.1007/s13042-020-01164-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
19
A Kohonen SOM Architecture for Intrusion Detection on In-Vehicle Communication Networks. APPLIED SCIENCES-BASEL 2020. [DOI: 10.3390/app10155062] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
20
A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions. ELECTRONICS 2020. [DOI: 10.3390/electronics9071177] [Citation(s) in RCA: 55] [Impact Index Per Article: 11.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
21
Intrusion Detection for in-Vehicle Communication Networks: An Unsupervised Kohonen SOM Approach. FUTURE INTERNET 2020. [DOI: 10.3390/fi12070119] [Citation(s) in RCA: 28] [Impact Index Per Article: 5.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]  Open
22
Ensemble-Based Online Machine Learning Algorithms for Network Intrusion Detection Systems Using Streaming Data. INFORMATION 2020. [DOI: 10.3390/info11060315] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
23
A New Proposal on the Advanced Persistent Threat: A Survey. APPLIED SCIENCES-BASEL 2020. [DOI: 10.3390/app10113874] [Citation(s) in RCA: 25] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
24
Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity. ENERGIES 2020. [DOI: 10.3390/en13102509] [Citation(s) in RCA: 46] [Impact Index Per Article: 9.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
25
Artificial Intelligence in the Cyber Domain: Offense and Defense. Symmetry (Basel) 2020. [DOI: 10.3390/sym12030410] [Citation(s) in RCA: 36] [Impact Index Per Article: 7.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA