1
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Enhancing cyber security: a comprehensive approach to the classification and prediction of significant cyber incidents (SCI) through data mining and variational neural network with fox optimization algorithm

Received 12 Jan 2024, Accepted 11 Jun 2024, Published online: 29 Jul 2024

References

  • Li S, Li L, Yan J, et al. SDE: a novel clustering framework based on sparsity-density entropy. IEEE Trans Knowl Data Eng. 2018;30(8):1575–1587. doi:10.1109/TKDE.2018.2792021
  • Ahmad J, Zia MU, Naqvi IH, et al. Machine learning and blockchain technologies for cybersecurity in connected vehicles. Wiley Interdiscip Rev: Data Min Knowl Discovery. 2023;14(1):e1515.
  • Rao MR, Yadav D, Anbarasu V. An improvised machine learning model KNN for malware detection and classification. In 2023 international conference on computer communication and informatics (ICCCI). IEEE 2023. 1–4.
  • Imran M, Siddiqui HU, Raza A, et al. A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems. Comput Secur. 2023;134:103445. doi:10.1016/j.cose.2023.103445
  • Bharadiya J. Machine learning in cybersecurity: techniques and challenges. Eur J Technol. 2023;7(2):1–14. doi:10.47672/ejt.1486
  • Salem IE, Al-Saedi KH. A sample proposal enhancing the security of the cloud computing system through deep learning and data mining. Al-Salam J Eng Technol. 2024; 3(1):1–10. doi:10.55145/ajest.2024.03.01.001
  • Sunardi S, Fadlil A, Kusuma NM. Comparing data mining classification for online fraud victim profile in Indonesia. INTENSIF: JurnalIlmiah PenelitiandanPenerapanTeknologiSistemInformasi. 2023;7(1):1–17. doi:10.29407/intensif.v7i1.18283
  • Soliman S, Oudah W, Aljuhani A. Deep learning-based intrusion detection approach for securing industrial internet of things. Alex Eng J. 2023;81:371–383. doi:10.1016/j.aej.2023.09.023
  • Aldhaheri A, Alwahedi F, Ferrag MA, et al. Deep learning for cyber threat detection in IoT networks: a review. Internet Things Cyber-Phys Syst. 2023.
  • Hemanand D, Vallem RR. Cyber security system based on machine learning using logistic decision support vector. Mesopotamian J Cybersecur. 2023;2023:64–72.
  • Mumtaz G, Akram S, Iqbal W, et al. Classification and prediction of significant cyber incidents (SCI) using data mining and machine learning (DM-ML). IEEE Access. 2023;11:94486–94496.
  • Subroto A, Apriyana A. Cyber risk prediction through social media big data analytics and statistical machine learning. J Big Data. 2019;6(1):50. doi:10.1186/s40537-019-0216-1
  • Sarkar S, Almukaynizi M, Shakarian J, et al. Mining user interaction patterns in the darkweb to predict enterprise cyber incidents. Soc Netw Anal Min. 2019;9(1):57. doi:10.1007/s13278-019-0603-9
  • Yeboah-Ofori A, Islam S, Lee SW, et al. Cyber threat predictive analytics for improving cyber supply chain security. IEEE Access. 2021;9:94318–94337. doi:10.1109/ACCESS.2021.3087109
  • Suprabhath K, Prasad MV, Chetty SM, et al. A deep learning based cyber attack detection scheme in DC microgrid systems. CPSS Trans Power Electron Appl. 2023;8(2):119–127.
  • Dong X, Chisci L, Cai Y. An adaptive variational Bayesian filter for nonlinear multi-sensor systems with unknown noise statistics. Signal Process. 2021;179:107837. doi:10.1016/j.sigpro.2020.107837
  • Chen H, Li W, Zhu Y. Improved window adaptive gray level co-occurrence matrix for extraction and analysis of texture characteristics of pulmonary nodules. Comput Methods Programs Biomed. 2021;208:106263. doi:10.1016/j.cmpb.2021.106263
  • Streeter MJ, Colgan C, Cobo CC, et al. Laser wake field accelerator modelling with variational neural networks. High Power Laser Sci Eng. 2023;11:e9.
  • Mohammed H, Rashid T. FOX: a FOX-inspired optimization algorithm. Appl Intell. 2023; 53(1):1030-1050. doi:10.1007/s10489-022-03533-0

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.