2019 IEEE International Conference on Big Data (Big Data) 2019
DOI: 10.1109/bigdata47090.2019.9006122
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Feature Engineering for Cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…Research in this area also derives many of its techniques from the image processing realm which is not always effective. As Maxwell et al point out [6], there is more work to be done to determine the best pre-processing techniques for network data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Research in this area also derives many of its techniques from the image processing realm which is not always effective. As Maxwell et al point out [6], there is more work to be done to determine the best pre-processing techniques for network data.…”
Section: Related Workmentioning
confidence: 99%
“…Further limiting the usefulness of AI-based approaches is the increasing application of adversarial AI. These techniques can cause the malfunction of AI systems through data poisoning, creation of altered inputs, and more [4]- [6]. Systems that rely upon data that can be altered by an adversary are subject to reduced effectiveness and reliability.…”
Section: Related Workmentioning
confidence: 99%
“…Maxwell et al [12] and Viegas [24] describe IDS tools that incorporate ML models. Unfortunately, raw network traffic data is not a suitable input for building accurate and efficient ML models.…”
Section: Related Work 21 Intrusion Detectionmentioning
confidence: 99%
“…These emerging systems are susceptible to attack by malicious actors wishing to degrade the system or steal proprietary information [7]. Intrusion detection systems (IDS) are central to maintaining the security of modern computer networks from malicious actors [12]. IDS have been successfully demonstrated in both the wired and wireless domain of IoT [10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation