References
- Sarker IH, Kayes AS, Badsha S, Alqahtani H, Watters P, Ng A. Cybersecurity data science: an overview from machine learning perspective. Journal of Big data. 2020 Dec;7(1):1-29. https://doi.org/10.1186/s40537-019-0278-0
- Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Gao M, Hou H, Wang C. Machine learning and deep learning methods for cybersecurity. Ieee access. 2018 May 15;6:35365-81. https://doi.org/10.1109/ACCESS.2018.2836950
- Shaukat K, Luo S, Varadharajan V, Hameed IA, Xu M. A survey on machine learning techniques for cyber security in the last decade. IEEE Access. 2020 Dec 2;8:222310-54. https://doi.org/10.1109/ACCESS.2020.3041951
- Amit I, Matherly J, Hewlett W, Xu Z, Meshi Y, Weinberger Y. Machine learning in cyber-security-problems, challenges and data sets. arXiv preprint arXiv:1812.07858. 2018 Dec 19.
- Torres JM, Comesana CI, Garcia-Nieto PJ. Machine learning techniques applied to cybersecurity. International Journal of Machine Learning and Cybernetics. 2019 Oct;10(10):2823-36. https://doi.org/10.1007/s13042-018-00906-1
- Ford V, Siraj A. Applications of machine learning in cyber security. InProceedings of the 27th international conference on computer applications in industry and engineering 2014 Oct 13 (Vol. 118). Kota Kinabalu: IEEE Xplore.
- Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials. 2015 Oct 26;18(2):1153-76. https://doi.org/10.1109/COMST.2015.2494502
- Sinclair C, Pierce L, Matzner S. An application of machine learning to network intrusion detection. InProceedings 15th Annual Computer Security Applications Conference (ACSAC'99) 1999 Dec 6 (pp. 371-377). IEEE.
- Abdulraheem MH, Ibraheem NB. A detailed analysis of new intrusion detection dataset. Journal of Theoretical and Applied Information Technology. 2019 Sep 15;97(17):4519-37.
- Alqahtani H, Sarker IH, Kalim A, Hossain SM, Ikhlaq S, Hossain S. Cyber intrusion detection using machine learning classification techniques. InInternational Conference on Computing Science, Communication and Security 2020 Mar 26 (pp. 121-131). Springer, Singapore
- Sabar NR, Yi X, Song A. A bi-objective hyper-heuristic support vector machines for big data cyber-security. Ieee Access. 2018 Mar 6;6:10421-31. https://doi.org/10.1109/ACCESS.2018.2801792
- Moustafa N, Slay J. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In2015 military communications and information systems conference (MilCIS) 2015 Nov 10 (pp. 1-6). IEEE.
- Bagui S, Kalaimannan E, Bagui S, Nandi D, Pinto A. Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset. Security and Privacy. 2019 Nov;2(6):e91.
- Sarraf J, Chakraborty S, Pattnaik PK. Detection of Network Intrusion and Classification of Cyberattack Using Machine Learning Algorithms: A Multistage Classifier Approach. InInternational conference on smart computing and cyber security: strategic foresight, security challenges and innovation 2020 Apr 23 (pp. 285-295). Springer, Singapore.
- Singh S, Agrawal S, Rizvi MA, Thakur RS. Improved Support Vector Machine for Cyber Attack Detection. InProceedings of the World Congress on Engineering and Computer Science 2011 Oct (Vol. 1).
- Sasan HP, Sharma M. Intrusion detection using feature selection and machine learning algorithm with misuse detection. International Journal of Computer Science and Information Technology. 2016 Feb;8(1):17-25. https://doi.org/10.5121/ijcsit.2016.8102
- Revathi S, Malathi A. A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. International Journal of Engineering Research & Technology (IJERT).2013 Dec;2(12):1848-53.
- Das K, Behera RN. A survey on machine learning: concept, algorithms and applications. International Journal of Innovative Research in Computer and Communication Engineering. 2017 Feb;5(2):1301-9.
- Sharma H, Kumar S. A survey on decision tree algorithms of classification in data mining. International Journal of Science and Research (IJSR). 2016 Apr 5;5(4):2094-7. https://doi.org/10.21275/v5i4.NOV162954
- Sonule AR, Kalla M, Jain A, Chouhan DS. UNSWNB15 Dataset and Machine Learning Based Intrusion Detection Systems. International Journal of Engineering and Advanced Technology. 2020;9:2638-48.
- Khan A. Data Science in Action: Key to Cyber security.