Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- SelectedWorks (118)
- Selected Works (79)
- Portland State University (68)
- Singapore Management University (54)
- University of Dayton (31)
-
- University of Arkansas, Fayetteville (30)
- Western University (30)
- Old Dominion University (28)
- Dakota State University (24)
- City University of New York (CUNY) (23)
- San Jose State University (21)
- California Polytechnic State University, San Luis Obispo (20)
- Air Force Institute of Technology (17)
- University of Massachusetts Amherst (15)
- Governors State University (14)
- Kennesaw State University (13)
- Florida International University (12)
- University of Tennessee, Knoxville (12)
- Edith Cowan University (11)
- University of Nebraska - Lincoln (11)
- Loyola University Chicago (10)
- University of Nevada, Las Vegas (10)
- California State University, San Bernardino (9)
- Embry-Riddle Aeronautical University (8)
- Michigan Technological University (7)
- Western Kentucky University (7)
- Munster Technological University (6)
- Western Michigan University (6)
- Nova Southeastern University (5)
- Purdue University (5)
- Keyword
-
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (73)
- Cloud computing (20)
- Computer science (20)
- Security (20)
- Data mining (19)
-
- Information Theory (18)
- Multivariate analysis discrete multivariate modeling (18)
- Probabilistic graphical modeling (18)
- Reconstructability Analysis (17)
- Cybersecurity (14)
- Machine learning (11)
- Cloud Computing (10)
- IoT (10)
- Computer architecture (9)
- Machine Learning (9)
- Performance (9)
- Software architecture (9)
- Internet of Things (8)
- Deep Learning (7)
- Distributed Systems (7)
- Navigation (7)
- Out-of-turn interaction (7)
- Privacy (7)
- System theory (7)
- Virtualization (7)
- Architecture (6)
- Big Data (6)
- Computer vision (6)
- Electronic data processing -- Distributed processing (6)
- HPC (6)
- Publication Year
- Publication
-
- Philadelphia University, Jordan (81)
- Research Collection School Of Computing and Information Systems (45)
- Computer Science Faculty Publications (36)
- Rudolf Kaehr (31)
- Systems Science Faculty Publications and Presentations (28)
-
- Computer Science Faculty Publications and Presentations (25)
- Graduate Theses and Dissertations (21)
- Masters Theses & Doctoral Dissertations (21)
- Doctoral Dissertations (20)
- Theses and Dissertations (20)
- Electronic Thesis and Dissertation Repository (18)
- Saverio Perugini (18)
- Open Educational Resources (17)
- All Capstone Projects (14)
- Master's Projects (14)
- Electrical and Computer Engineering Publications (11)
- FIU Electronic Theses and Dissertations (11)
- Computer Science: Faculty Publications and Other Works (10)
- Master's Theses (10)
- Faculty Publications (9)
- Computer Science Theses & Dissertations (8)
- Electronic Theses and Dissertations (8)
- Jeremy Straub (8)
- Dissertations and Theses (7)
- Dissertations and Theses Collection (Open Access) (7)
- Dissertations, Master's Theses and Master's Reports (7)
- Computer Engineering (6)
- Electronic Theses, Projects, and Dissertations (6)
- George K. Thiruvathukal (6)
- Masters Theses (6)
Articles 1 - 30 of 858
Full-Text Articles in Entire DC Network
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Military Cyber Affairs
Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.
Crash Detecting System Using Deep Learning, Yogesh Reddy Muddam
Crash Detecting System Using Deep Learning, Yogesh Reddy Muddam
Electronic Theses, Projects, and Dissertations
Accidents pose a significant risk to both individual and property safety, requiring effective detection and response systems. This work introduces an accident detection system using a convolutional neural network (CNN), which provides an impressive accuracy of 86.40%. Trained on diverse data sets of images and videos from various online sources, the model exhibits complex accident detection and classification and is known for its prowess in image classification and visualization.
CNN ensures better accident detection in various scenarios and road conditions. This example shows its adaptability to a real-world accident scenario and enhances its effectiveness in detecting early events. A key …
Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas
Multi-Script Handwriting Identification By Fragmenting Strokes, Joshua Jude Thomas
<strong> Theses and Dissertations </strong>
This study tests the effectiveness of Multi-Script Handwriting Identification after simplifying character strokes, by segmenting them into sub-parts. Character simplification is performed through splitting the character by branching-points and end-points, a process called stroke fragmentation in this study. The resulting sub-parts of the character are called stroke fragments and are evaluated individually to identify the writer. This process shares similarities with the concept of stroke decomposition in Optical Character Recognition which attempts to recognize characters through the writing strokes that make them up. The main idea of this study is that the characters of different writing‑scripts (English, Chinese, etc.) may …
Exploring Decentralized Computing Using Solid And Ipfs For Social Media Applications, Pranav Balasubramanian Natarajan
Exploring Decentralized Computing Using Solid And Ipfs For Social Media Applications, Pranav Balasubramanian Natarajan
Computer Science and Computer Engineering Undergraduate Honors Theses
As traditional centralized social media platforms face growing concerns over data privacy, censorship, and lack of user control, there has been an increasing interest in decentralized alternatives. This thesis explores the design and implementation of a decentralized social media application by integrating two key technologies: Solid and the InterPlanetary File System (IPFS). Solid, led by Sir Tim Berners-Lee, enables users to store and manage their personal data in decentralized "Pods," giving them ownership over their digital identities. IPFS, a peer-to-peer hypermedia protocol, facilitates decentralized file storage and sharing, ensuring content availability and resilience against censorship. By leveraging these technologies, the …
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Poster Presentations
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Whittier Scholars Program
The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales
Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales
ATU Research Symposium
Binder is a mobile application that aims to introduce readers to a book recommendation service that appeals to devoted and casual readers. The main goal of Binder is to enrich book selection and reading experience. This project was created in response to deficiencies in the mobile space for book suggestions, library management, and reading personalization. The tools we used to create the project include Visual Studio, .Net Maui Framework, C#, XAML, CSS, MongoDB, NoSQL, Git, GitHub, and Figma. The project’s selection of books were sourced from the Google Books repository. Binder aims to provide an intuitive interface that allows users …
Superminds At Work: The Promise Of Human-Ai Collaboration, Thomas W. Malone
Superminds At Work: The Promise Of Human-Ai Collaboration, Thomas W. Malone
Asian Management Insights
Massachusetts Institute of Technology (MIT) Center for Collective Intelligence Director Professor Thomas W. Malone’s scholarship offers deep insights into the promise afforded by the synergies between human intelligence and technology. According to Professor Malone, the boundaries between human intellect and technological prowess are becoming increasingly blurred, but this may not be a bad thing for humankind. In Asian Management Insights’ inaugural Pulse Point interview, we get to learn more about the concept of ‘collective intelligence’, which explores how a partnership between humans and Artificial Intelligence (AI) can be catalysed to make ground-breaking advancements in addressing the wicked problems of our …
The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity
The Aim To Decentralize Economic Systems With Blockchains And Crypto, Mary Lacity
Arkansas Law Review
As an information systems (“IS”) professor, I wrote this Article for legal professionals new to blockchains and crypto. This target audience likely is most interested in crypto for its legal implications—depending on whether it functions as currencies, securities, commodities, or properties; however, legal professionals also need to understand crypto’s origin, how transactions work, and how they are governed.
Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene
Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene
Electronic Theses and Dissertations
This thesis comprises three distinct, yet interconnected studies addressing critical aspects of web infrastructure management. We begin by studying containerization via Docker and its impact on web server performance, focusing on Apache and Nginx hosted on virtualized environments. Through meticulous load testing and analysis, we provide insights into the comparative performance of these servers, adding users of this technology know which webservers to leverage when hosting their webservice along alongside the infrastructure to host it on. Next, we expand our focus to examine the performance of caching systems, namely Redis and Memcached, across traditional VMs and Docker containers. By comparing …
Development Of A Collaborative Research Platform For Efficient Data Management And Visualization Of Qubit Control, Devanshu Brahmbhatt
Development Of A Collaborative Research Platform For Efficient Data Management And Visualization Of Qubit Control, Devanshu Brahmbhatt
Computer Science and Engineering Theses
This thesis introduces QubiCSV, a pioneering open-source platform for quantum computing field. With an emphasis on collaborative research, QubiCSV addresses the critical need for specialized data management and visualization tools in qubit control. The platform is crafted to overcome the challenges posed by the high costs and complexities associated with quantum experimental setups. It emphasizes efficient utilization of resources through shared ideas, data, and implementation strategies. One of the primary obstacles in quantum computing research has been the ineffective management of extensive calibration data and the inability to visualize complex quantum experiment outcomes effectively. QubiCSV fills this gap by offering …
Cross-Layer Design Of Highly Scalable And Energy-Efficient Ai Accelerator Systems Using Photonic Integrated Circuits, Sairam Sri Vatsavai
Cross-Layer Design Of Highly Scalable And Energy-Efficient Ai Accelerator Systems Using Photonic Integrated Circuits, Sairam Sri Vatsavai
Theses and Dissertations--Electrical and Computer Engineering
Artificial Intelligence (AI) has experienced remarkable success in recent years, solving complex computational problems across various domains, including computer vision, natural language processing, and pattern recognition. Much of this success can be attributed to the advancements in deep learning algorithms and models, particularly Artificial Neural Networks (ANNs). In recent times, deep ANNs have achieved unprecedented levels of accuracy, surpassing human capabilities in some cases. However, these deep ANN models come at a significant computational cost, with billions to trillions of parameters. Recent trends indicate that the number of parameters per ANN model will continue to grow exponentially in the foreseeable …
Enhancing Urban Life: A Policy-Based Autonomic Smart City Management System For Efficient, Sustainable, And Self-Adaptive Urban Environments, Elham Okhovat
Electronic Thesis and Dissertation Repository
This thesis proposes the concept of the Policy-based Autonomic Smart City Management System, an innovative framework designed to comprehensively manage diverse aspects of urban environments, ranging from environmental conditions such as temperature and air quality to the infrastructure which comprises multiple layers of infrastructure, from sensors and devices to advanced IoT platforms and applications. Efficient management requires continuous monitoring of devices and infrastructure, data analysis, and real-time resource assessment to ensure seamless city operations and improve residents' quality of life. Automating data monitoring is essential due to the vast array of hardware and data exchanges, and round-the-clock monitoring is critical. …
A Conceptual Decentralized Identity Solution For State Government, Martin Duclos
A Conceptual Decentralized Identity Solution For State Government, Martin Duclos
Theses and Dissertations
In recent years, state governments, exemplified by Mississippi, have significantly expanded their online service offerings to reduce costs and improve efficiency. However, this shift has led to challenges in managing digital identities effectively, with multiple fragmented solutions in use. This paper proposes a Self-Sovereign Identity (SSI) framework based on distributed ledger technology. SSI grants individuals control over their digital identities, enhancing privacy and security without relying on a centralized authority. The contributions of this research include increased efficiency, improved privacy and security, enhanced user satisfaction, and reduced costs in state government digital identity management. The paper provides background on digital …
Towards Expressive And Versatile Visualization-As-A-Service (Vaas), Tanner C. Hobson
Towards Expressive And Versatile Visualization-As-A-Service (Vaas), Tanner C. Hobson
Doctoral Dissertations
The rapid growth of data in scientific visualization has posed significant challenges to the scalability and availability of interactive visualization tools. These challenges can be largely attributed to the limitations of traditional monolithic applications in handling large datasets and accommodating multiple users or devices. To address these issues, the Visualization-as-a-Service (VaaS) architecture has emerged as a promising solution. VaaS leverages cloud-based visualization capabilities to provide on-demand and cost-effective interactive visualization. Existing VaaS has been simplistic by design with focuses on task-parallelism with single-user-per-device tasks for predetermined visualizations. This dissertation aims to extend the capabilities of VaaS by exploring data-parallel visualization …
Deep Learning For Photovoltaic Characterization, Adrian Manuel De Luis Garcia
Deep Learning For Photovoltaic Characterization, Adrian Manuel De Luis Garcia
Graduate Theses and Dissertations
This thesis introduces a novel approach to Photovoltaic (PV) installation segmentation by proposing a new architecture to understand and identify PV modules from overhead imagery. Pivotal to this concept is the creation of a new Transformer-based network, S3Former, which focuses on small object characterization and modelling intra- and inter- object differentiation inside an image. Accurate mapping of PV installations is pivotal for understanding their adoption and guiding energy policy decisions. Drawing insights from current Deep Learning methodologies for image segmentation and building upon State-of-the-Art (SOTA) techniques in solar cell mapping, this work puts forth S3Former with the following enhancements: 1. …
Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett
Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett
<strong> Theses and Dissertations </strong>
Over the last two decades, side-channel vulnerabilities have shown to be a major threat to embedded devices. Most side-channel research has developed our understanding of the vulnerabilities to cryptographic devices due to their implementation and how we can protect them. However, side-channel leakage can yield useful information about many other processes that run on the device. One promising area that has received little attention is the side-channel leakage due to the execution of assembly instructions. There has been some work in this area that has demonstrated the idea’s potential, but so far, this research has assumed the adversary has physical …
Towards Long-Term Fairness In Sequential Decision Making, Yaowei Hu
Towards Long-Term Fairness In Sequential Decision Making, Yaowei Hu
Graduate Theses and Dissertations
With the development of artificial intelligence, automated decision-making systems are increasingly integrated into various applications, such as hiring, loans, education, recommendation systems, and more. These machine learning algorithms are expected to facilitate faster, more accurate, and impartial decision-making compared to human judgments. Nevertheless, these expectations are not always met in practice due to biased training data, leading to discriminatory outcomes. In contemporary society, countering discrimination has become a consensus among people, leading the EU and the US to enact laws and regulations that prohibit discrimination based on factors such as gender, age, race, and religion. Consequently, addressing algorithmic discrimination has …
Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike
Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike
Masters Theses & Specialist Projects
The Jing-Jin-Ji region of China is a highly industrialized and populated area of the country. Its periodic high pollution and smog includes particles smaller than 2.5 μm, known as PM2.5, linked to many respiratory and cardiovascular illnesses. PM2.5 concentration around Jing-Jin-Ji has exceeded China’s urban air quality safety threshold for over 20% of all days in 2017 through 2020.
The quantity of ground weather stations that measure the concentrations of these pollutants, and their valuable data, is unfortunately small. By employing many machine learning strategies, many researchers have focused on interpolating finer spatial grids of PM2.5, or hindcasting PM2.5. However, …
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Honors Theses
Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …
Optimizing Collective Communication For Scalable Scientific Computing And Deep Learning, Jiali Li
Optimizing Collective Communication For Scalable Scientific Computing And Deep Learning, Jiali Li
Doctoral Dissertations
In the realm of distributed computing, collective operations involve coordinated communication and synchronization among multiple processing units, enabling efficient data exchange and collaboration. Scientific applications, such as simulations, computational fluid dynamics, and scalable deep learning, require complex computations that can be parallelized across multiple nodes in a distributed system. These applications often involve data-dependent communication patterns, where collective operations are critical for achieving high performance in data exchange. Optimizing collective operations for scientific applications and deep learning involves improving the algorithms, communication patterns, and data distribution strategies to minimize communication overhead and maximize computational efficiency.
Within the context of this …
Multi-Scale Attention Networks For Pavement Defect Detection, Junde Chen, Yuxin Wen, Yaser Ahangari Nanehkaran, Defu Zhang, Adan Zeb
Multi-Scale Attention Networks For Pavement Defect Detection, Junde Chen, Yuxin Wen, Yaser Ahangari Nanehkaran, Defu Zhang, Adan Zeb
Engineering Faculty Articles and Research
Pavement defects such as cracks, net cracks, and pit slots can cause potential traffic safety problems. The timely detection and identification play a key role in reducing the harm of various pavement defects. Particularly, the recent development in deep learning-based CNNs has shown competitive performance in image detection and classification. To detect pavement defects automatically and improve effects, a multi-scale mobile attention-based network, which we termed MANet, is proposed to perform the detection of pavement defects. The architecture of the encoder-decoder is used in MANet, where the encoder adopts the MobileNet as the backbone network to extract pavement defect features. …
Future Trends And Directions For Secure Infrastructure Architecture In The Education Sector: A Systematic Review Of Recent Evidence, Isaac Atta Senior Ampofo, Isaac Atta Junior Ampofo
Future Trends And Directions For Secure Infrastructure Architecture In The Education Sector: A Systematic Review Of Recent Evidence, Isaac Atta Senior Ampofo, Isaac Atta Junior Ampofo
Journal of Research Initiatives
The most efficient approach to giving large numbers of students’ access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher examines potential directions and trends for a secured infrastructure design in this article. Additionally, interoperable, highly reusable modules that can include the newest trends in the education industry are made possible by cloud-based educational software. The Reference Architecture for University Education System Using AWS Services is presented …
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Electronic Thesis and Dissertation Repository
In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …
A Multimodal Immune System Inspired Defense Architecture For Detecting And Deterring Digital Pathogens In Container Hosted Web Services, Islam Khalil
Theses and Dissertations
With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down …
Expressive Marks: Art In The Age Of Augmented Reality, Carson G. Levine
Expressive Marks: Art In The Age Of Augmented Reality, Carson G. Levine
Dartmouth College Master’s Theses
Augmented reality (AR) and non-fungible tokens (NFTs) introduce new considerations for the long-standing debate of what it means for digital art to be “real.” However, the ability to create AR experiences is limited to those who are technically skilled or who can afford to consult someone else. This paper addresses the need for an accessible tool that enables artists of all technical backgrounds to expressively create marks in AR. The solution includes a mobile application called CrayonAR. The system was designed to be modular, minimal, and physically engaging, and was developed in Unity using ARFoundation and Firebase Storage and Realtime …
Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu
Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu
Masters Theses & Specialist Projects
Advancements in computer technology and internet services have led to the availability of vast amounts of information like videos, articles, research papers, and code samples. Free online information will increase the possibility of plagiarism and collusion among students. People can commit plagiarism in both text and code [1], as tools used to detect plagiarism between texts and between codes are distinct. Traditionally plagiarism in code is detected using manual inspection, which is a tedious process and misses to compare code from previous submissions and external sources. To overcome this issue, systems that can automatically detect plagiarism in code were developed …
Dynamically Finding Optimal Kernel Launch Parameters For Cuda Programs, Taabish Jeshani
Dynamically Finding Optimal Kernel Launch Parameters For Cuda Programs, Taabish Jeshani
Electronic Thesis and Dissertation Repository
In this thesis, we present KLARAPTOR (Kernel LAunch parameters RAtional Program estimaTOR), a freely available tool to dynamically determine the values of kernel launch parameters of a CUDA kernel. We describe a technique for building a helper program, at the compile-time of a CUDA program, that is used at run-time to determine near-optimal kernel launch parameters for the kernels of that CUDA program. This technique leverages the MWP-CWP performance prediction model, runtime data parameters, and runtime hardware parameters to dynamically determine the launch parameters for each kernel invocation. This technique is implemented within the KLARAPTOR tool, utilizing the LLVM Pass …
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
SMU Data Science Review
Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …