References
- Li S, Li L, Yan J, et al. SDE: a novel clustering framework based on sparsity-density entropy. IEEE Trans Knowl Data Eng. 2018;30(8):1575–1587. doi:10.1109/TKDE.2018.2792021
- Ahmad J, Zia MU, Naqvi IH, et al. Machine learning and blockchain technologies for cybersecurity in connected vehicles. Wiley Interdiscip Rev: Data Min Knowl Discovery. 2023;14(1):e1515.
- Rao MR, Yadav D, Anbarasu V. An improvised machine learning model KNN for malware detection and classification. In 2023 international conference on computer communication and informatics (ICCCI). IEEE 2023. 1–4.
- Imran M, Siddiqui HU, Raza A, et al. A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems. Comput Secur. 2023;134:103445. doi:10.1016/j.cose.2023.103445
- Bharadiya J. Machine learning in cybersecurity: techniques and challenges. Eur J Technol. 2023;7(2):1–14. doi:10.47672/ejt.1486
- Salem IE, Al-Saedi KH. A sample proposal enhancing the security of the cloud computing system through deep learning and data mining. Al-Salam J Eng Technol. 2024; 3(1):1–10. doi:10.55145/ajest.2024.03.01.001
- Sunardi S, Fadlil A, Kusuma NM. Comparing data mining classification for online fraud victim profile in Indonesia. INTENSIF: JurnalIlmiah PenelitiandanPenerapanTeknologiSistemInformasi. 2023;7(1):1–17. doi:10.29407/intensif.v7i1.18283
- Soliman S, Oudah W, Aljuhani A. Deep learning-based intrusion detection approach for securing industrial internet of things. Alex Eng J. 2023;81:371–383. doi:10.1016/j.aej.2023.09.023
- Aldhaheri A, Alwahedi F, Ferrag MA, et al. Deep learning for cyber threat detection in IoT networks: a review. Internet Things Cyber-Phys Syst. 2023.
- Hemanand D, Vallem RR. Cyber security system based on machine learning using logistic decision support vector. Mesopotamian J Cybersecur. 2023;2023:64–72.
- Mumtaz G, Akram S, Iqbal W, et al. Classification and prediction of significant cyber incidents (SCI) using data mining and machine learning (DM-ML). IEEE Access. 2023;11:94486–94496.
- Subroto A, Apriyana A. Cyber risk prediction through social media big data analytics and statistical machine learning. J Big Data. 2019;6(1):50. doi:10.1186/s40537-019-0216-1
- Sarkar S, Almukaynizi M, Shakarian J, et al. Mining user interaction patterns in the darkweb to predict enterprise cyber incidents. Soc Netw Anal Min. 2019;9(1):57. doi:10.1007/s13278-019-0603-9
- Yeboah-Ofori A, Islam S, Lee SW, et al. Cyber threat predictive analytics for improving cyber supply chain security. IEEE Access. 2021;9:94318–94337. doi:10.1109/ACCESS.2021.3087109
- Suprabhath K, Prasad MV, Chetty SM, et al. A deep learning based cyber attack detection scheme in DC microgrid systems. CPSS Trans Power Electron Appl. 2023;8(2):119–127.
- Dong X, Chisci L, Cai Y. An adaptive variational Bayesian filter for nonlinear multi-sensor systems with unknown noise statistics. Signal Process. 2021;179:107837. doi:10.1016/j.sigpro.2020.107837
- Chen H, Li W, Zhu Y. Improved window adaptive gray level co-occurrence matrix for extraction and analysis of texture characteristics of pulmonary nodules. Comput Methods Programs Biomed. 2021;208:106263. doi:10.1016/j.cmpb.2021.106263
- Streeter MJ, Colgan C, Cobo CC, et al. Laser wake field accelerator modelling with variational neural networks. High Power Laser Sci Eng. 2023;11:e9.
- Mohammed H, Rashid T. FOX: a FOX-inspired optimization algorithm. Appl Intell. 2023; 53(1):1030-1050. doi:10.1007/s10489-022-03533-0