Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
2,176
result(s) for
"Machine learning Security measures."
Sort by:
Integrating Artificial Intelligence and Machine Learning with Blockchain Security
by
Mala, D. Jeya
,
Ganesan, R
in
Artificial intelligence-Safety measures
,
Blockchains (Databases)-Security measures
,
Machine learning-Security measures
2023
Due to its transparency and dependability in secure online transactions, blockchain technology has grown in prominence in recent years. Several industries, including those of finance, healthcare, energy and utilities, manufacturing, retail marketing, entertainment and media, supply chains, e-commerce, and e-business, among others, use blockchain technology.In order to enable intelligent decision-making to prevent security assaults, particularly in permission-less blockchain platforms, artificial intelligence (AI) techniques and machine learning (ML) algorithms are used. By exploring the numerous use cases and security methods used in each of them, this book offers insight on the application of AI and ML in blockchain security principles. The book argues that it is crucial to include artificial intelligence and machine learning techniques in blockchain technology in order to increase security.
Big data analytics in fog-enabled IoT networks : towards a privacy and security perspective
\"Integration of Fog computing with the resource limited IoT network, formulate the concept of Fog-enabled IoT system. Due to large number of deployments of IoT devices, a IoT is a main source of Big data and a very high volume of sensing data is generated by IoT system such as smart cities and smart grid applications. To provide a fast and efficient data analytics solution for Fog-enabled IoT system is a very fundamental research issue. This book focus on Big data Analytics in Fog-enabled-IoT system and provides a comprehensive collection of chapters that are touches different issues related to Healthcare system, Cyber threat detection, Malware detection, security and privacy of big IoT data and IoT network. This book emphasizes and facilitate a greater understanding of various security and privacy approaches using the advance AI and Big data technologies like machine/deep learning, federated learning, blockchain, edge computing and the countermeasures to overcome the vulnerabilities of the Fog-enabled IoT system\"-- Provided by publisher.
A Joint Resource Allocation, Security with Efficient Task Scheduling in Cloud Computing Using Hybrid Machine Learning Techniques
by
Bal, Prasanta Kumar
,
Mohapatra, Sudhir Kumar
,
Srinivasan, Kathiravan
in
Algorithms
,
Application service providers
,
Cloud Computing
2022
The rapid growth of cloud computing environment with many clients ranging from personal users to big corporate or business houses has become a challenge for cloud organizations to handle the massive volume of data and various resources in the cloud. Inefficient management of resources can degrade the performance of cloud computing. Therefore, resources must be evenly allocated to different stakeholders without compromising the organization’s profit as well as users’ satisfaction. A customer’s request cannot be withheld indefinitely just because the fundamental resources are not free on the board. In this paper, a combined resource allocation security with efficient task scheduling in cloud computing using a hybrid machine learning (RATS-HM) technique is proposed to overcome those problems. The proposed RATS-HM techniques are given as follows: First, an improved cat swarm optimization algorithm-based short scheduler for task scheduling (ICS-TS) minimizes the make-span time and maximizes throughput. Second, a group optimization-based deep neural network (GO-DNN) for efficient resource allocation using different design constraints includes bandwidth and resource load. Third, a lightweight authentication scheme, i.e., NSUPREME is proposed for data encryption to provide security to data storage. Finally, the proposed RATS-HM technique is simulated with a different simulation setup, and the results are compared with state-of-art techniques to prove the effectiveness. The results regarding resource utilization, energy consumption, response time, etc., show that the proposed technique is superior to the existing one.
Journal Article
Applications of machine learning and deep learning for privacy and cybersecurity
\"This comprehensive and timely book provides an overview of the field of Machine and Deep Learning in the areas of cybersecurity and privacy, followed by an in-depth view of emerging research exploring the theoretical aspects of machine and deep learning, as well as real-world implementations\"-- Provided by publisher.
Network Anomaly Detection
by
Bhattacharyya, Dhruba Kumar
,
Kalita, Jugal Kumar
in
Anomaly detection (Computer security)
,
Computer networks
,
Computer networks -- Security measures
2013,2014
This book discusses the detection of anomalies in computer networks from a machine learning perspective. It examines how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. You'll learn how to look for patterns in captured network traffic data to unearth potential intrusion attempts. Coverage includes machine learning techniques and algorithms, a taxonomy of attacks, and practical tools for launching attacks, capturing packet or flow traffic, extracting features, detecting attacks, and evaluating performance.
Internet of Things Security: Fundamentals, Techniques and Applications
2020,2018
Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors have sold IoT solutions without thorough preventive measures. The idea of incorporating networking appliances in IoT systems is relatively new, and hence IoT security has not always been considered in the product design. To improve security, an IoT device that needs to be directly accessible over the Internet should be segmented into its own network, and have general network access restricted. The network segment should be monitored to identify potential anomalous traffic, and action should be taken if a problem arises. This has generated an altogether new area of research, which seeks possible solutions for securing the devices, and communication amongst them. Internet of Things Security: Fundamentals, Techniques and Applications provides a comprehensive overview of the overall scenario of IoT Security whilst highlighting recent research and applications in the field. Technical topics discussed in the book include: • Machine-to-Machine Communications • IoT Architecture • Identity of Things • Block Chain • Parametric Cryptosystem • Software and Cloud Components
Network anomaly detection : a machine learning perspective
\"This book discusses detection of anomalies in computer networks from a machine learning perspective. It introduces readers to how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. The reader will learn how one can look for patterns in captured network traffic data to look for anomalous patterns that may correspond to attempts at unauthorized intrusion. The reader will be given a technical and sophisticated description of such algorithms and their applications in the context of intrusion detection in networks\"-- Provided by publisher.
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
2022
Due to the rapid growth in IT technology, digital data have increased availability, creating novel security threats that need immediate attention. An intrusion detection system (IDS) is the most promising solution for preventing malicious intrusions and tracing suspicious network behavioral patterns. Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. In the initial phase, the proposed HNIDS utilizes hybrid EGA-PSO methods to enhance the minor data samples and thus produce a balanced data set to learn the sample attributes of small samples more accurately. In the proposed HNIDS, a PSO method improves the vector. GA is enhanced by adding a multi-objective function, which selects the best features and achieves improved fitness outcomes to explore the essential features and helps minimize dimensions, enhance the true positive rate (TPR), and lower the false positive rate (FPR). In the next phase, an IRF eliminates the less significant attributes, incorporates a list of decision trees across each iterative process, supervises the classifier’s performance, and prevents overfitting issues. The performance of the proposed method and existing ML methods are tested using the benchmark datasets NSL-KDD. The experimental findings demonstrated that the proposed HNIDS method achieves an accuracy of 98.979% on BCC and 88.149% on MCC for the NSL-KDD dataset, which is far better than the other ML methods i.e., SVM, RF, LR, NB, LDA, and CART.
Journal Article