2023
DOI: 10.3390/fi15100332
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning: Models, Challenges, and Research Directions

Tala Talaei Khoei,
Naima Kaabouch

Abstract: Machine learning techniques have emerged as a transformative force, revolutionizing various application domains, particularly cybersecurity. The development of optimal machine learning applications requires the integration of multiple processes, such as data pre-processing, model selection, and parameter optimization. While existing surveys have shed light on these techniques, they have mainly focused on specific application domains. A notable gap that exists in current studies is the lack of a comprehensive o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 123 publications
0
2
0
Order By: Relevance
“…where, p is a dimensional column vector and c > 0 is a regularization parameter. For X is the original input (i.e., image) affiliated with the specified label l, X is the adversarial sample affiliated with the specified label t (i.e., f (X ) = t = f (X) = l, where f (X + t) is the loss function defined by below Expression (11):…”
Section: Zeroth-order Optimizationmentioning
confidence: 99%
See 1 more Smart Citation
“…where, p is a dimensional column vector and c > 0 is a regularization parameter. For X is the original input (i.e., image) affiliated with the specified label l, X is the adversarial sample affiliated with the specified label t (i.e., f (X ) = t = f (X) = l, where f (X + t) is the loss function defined by below Expression (11):…”
Section: Zeroth-order Optimizationmentioning
confidence: 99%
“…To detect and mitigate cyberattacks, Intrusion Detection Systems (IDSs) [4], Malware Detection Systems (MDSs) [5], and Device Identification Systems (DISs) [6] are often employed to monitor IoT network traffic and detect malicious activities [7][8][9]. ML [10,11] techniques, including Deep Learning (DL) [12,13], have shown promise in enhancing the effectiveness of these systems, by leveraging the ability of ML algorithms to learn from data and identify patterns that indicate anomalous behavior.…”
Section: Introductionmentioning
confidence: 99%