2020
DOI: 10.1109/tcyb.2019.2940940
|View full text |Cite
|
Sign up to set email alerts
|

Data-Driven Cyber Security in Perspective—Intelligent Traffic Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
35
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2

Relationship

4
5

Authors

Journals

citations
Cited by 94 publications
(35 citation statements)
references
References 74 publications
0
35
0
Order By: Relevance
“…They also extracted and summarized the research methodology at critical phases of predicting cybersecurity incident. In the research of Coulter et al [18], a new research methodology of data-driven cyber security (DDCS) was demonstrated, and its application in social and Internet traffic analysis was studied. DDCS shows the strong link between data, model, and methodology during the review of key recent works in Twitter spam detection and IP traffic classification.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They also extracted and summarized the research methodology at critical phases of predicting cybersecurity incident. In the research of Coulter et al [18], a new research methodology of data-driven cyber security (DDCS) was demonstrated, and its application in social and Internet traffic analysis was studied. DDCS shows the strong link between data, model, and methodology during the review of key recent works in Twitter spam detection and IP traffic classification.…”
Section: Related Workmentioning
confidence: 99%
“…Based on the idea of classification, the researchers have designed numerical form characteristics to identify spam users. The supervised machine learning algorithm can be split into a single classification algorithm and an integrated classification algorithm (e.g., Support Vector Machine (SVM) [3] [8][9][10][11] [13][14], meta-classifiers (Decorate, Logit Boost) [4], Naive Bayesian (NB) [6][9] [11], Back Propagation Neural Network (BP) [16], Radial Basis Function (RBF) [18], Extreme Learning Machine (ELM) [8] [22], K-nearest Neighbor (KNN) [9] [19], Decision Tree (DT) [9] [20], Random Forest (RF) [5] [7][8][9][ [23][24][25][26] and eXtreme Gradient Boosting (XGBoost) [31,32]).…”
Section: Introductionmentioning
confidence: 99%
“…However, it still faces some sort based attack and the client storage is heavy. Furthermore, data-driven cyber security [14][15][16][17] is also the focus of protection.…”
Section: Introductionmentioning
confidence: 99%
“…In reconstruction network, the fused feature maps are the input, and the source image pair also used for reconstruction of fusion image. Considering trustworthy is a critical issue in the real-world applications of image fusion [7][8][9][10], we also propose to apply blockchain technology to protect sensitive information.…”
Section: Introductionmentioning
confidence: 99%