Open Access
Issue
ITM Web Conf.
Volume 70, 2025
2024 2nd International Conference on Data Science, Advanced Algorithm and Intelligent Computing (DAI 2024)
Article Number 01018
Number of page(s) 7
Section Traffic Prediction and Analysis
DOI https://doi.org/10.1051/itmconf/20257001018
Published online 23 January 2025
  1. W.A. Ali , K.N. Manasa, M. Bendechache, A review of current machine learning approaches for anomaly detection in network traffic. Journal of Telecommunications and the Digital Economy. 8(4), 64–95 (2020) [CrossRef] [Google Scholar]
  2. S. Aftergood, Cybersecurity: the cold war online. Nature. 547, 30-31 (2017) [CrossRef] [Google Scholar]
  3. M. Belgiu, L. Dragut, Random forest in remote sensing: A review of applications and future directions. ISPRS journal of photogrammetry and remote sensing. 114, 24-31 (2016) [CrossRef] [Google Scholar]
  4. M.-A. Al-Garadi, A. Mohamed, A. Al-Ali, X. Du, and M. Guizani, A survey of machine and deep learning methods for internet of things (iot) security. IEEE communications surveys & tutorials. 22, 1646-1685 (2020) [CrossRef] [Google Scholar]
  5. D. Berman, A. Buczak, J. Chavis, and C. Corbett, A survey of deep learning methods for cyber security, Information. 10.4, 122 (2019) [Google Scholar]
  6. G. Apruzzese, M. Colajanni, L. Ferretti, A. Guido, and M. Marchetti, On the effectiveness of machine and deep learning for cyber security, Proceedings of 2018 10th International Conference on Cyber Conflict (CyCon), IEEE, (2018), 371–390 [CrossRef] [Google Scholar]
  7. C. S. Wickramasinghe, D.L. Marino, K. Amarasinghe, and M. Manic, Generalization of deep learning for cyber-physical system security: a survey. In IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, IEEE, 2018, 745–751 [Google Scholar]
  8. A. Aleesa, B. Zaidan, A. Zaidan, and N.M. Sahar, Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions. Neural Computing and Applications. 32, 9827-9858 (2020) [CrossRef] [Google Scholar]
  9. M.A. Ferrag, L. Maglaras, S. Moschoyiannis, and H. Janicke, Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications. 50, 102419 (2020) [CrossRef] [Google Scholar]
  10. E.G. Dada, J.S. Bassi, H. Chiroma, A.O. Adetunmbi, O.E. Ajibuwa, Machine learning for email spam filtering: review, approaches and open research problems. Heliyon. 5, 6 (2019) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.