Handbook of Big Data Privacy 2020
DOI: 10.1007/978-3-030-38557-6_8
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Network Security Via Machine Learning: Opportunities and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 45 publications
0
6
0
Order By: Relevance
“…In the literature, many areas extended the models of machine learning. These areas include Solar energy [23], Telecommunication [24], Network security [25], Disease classification [26], and Computer vision [27]. In addition, machine-learning models can be used for either classification or prediction of data points without explicit programming of these tasks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the literature, many areas extended the models of machine learning. These areas include Solar energy [23], Telecommunication [24], Network security [25], Disease classification [26], and Computer vision [27]. In addition, machine-learning models can be used for either classification or prediction of data points without explicit programming of these tasks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Machine learning models have been extended in several areas such as telecommunication [23], Computer Vision [24], Disease Classification [25], Solar Energy [26], and Network Security [27]. These models learn from data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Most of the research uses default classification settings. Default settings mostly result in under performance of the machine learning classification model (Ahmed et al 2019a;Ahmed et al 2020, Amrollahi et al 2020: the feature extraction, selection, model selection, hyper-parameter tuning and evaluation need to be optimized. Most research avenues do not consider multi-node application splitting or merger technique and the load balancing issue in the cluster of a heterogeneous environment.…”
Section: Critical Analysismentioning
confidence: 99%