You are currently on the new version of our website. Access the old version .

599 Results Found

  • Review
  • Open Access
46 Citations
15,148 Views
26 Pages

22 August 2020

This is a systematic review of over one hundred research papers about machine learning methods applied to defensive and offensive cybersecurity. In contrast to previous reviews, which focused on several fragments of research topics in this area, this...

  • Review
  • Open Access
147 Citations
65,761 Views
29 Pages

Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review

  • Mostofa Ahsan,
  • Kendall E. Nygard,
  • Rahul Gomes,
  • Md Minhaz Chowdhury,
  • Nafiz Rifat and
  • Jayden F Connolly

Machine learning is of rising importance in cybersecurity. The primary objective of applying machine learning in cybersecurity is to make the process of malware detection more actionable, scalable and effective than traditional approaches, which requ...

  • Article
  • Open Access
5 Citations
3,422 Views
15 Pages

9 March 2023

Cybersecurity is a complex subject for students to pursue. Hands-on online learning through labs and simulations can help students become more familiar with the subject at security classes to pursue cybersecurity education. There are several online t...

  • Feature Paper
  • Review
  • Open Access
267 Citations
20,322 Views
27 Pages

Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity

  • Kamran Shaukat,
  • Suhuai Luo,
  • Vijay Varadharajan,
  • Ibrahim A. Hameed,
  • Shan Chen,
  • Dongxi Liu and
  • Jiaming Li

15 May 2020

Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious thre...

  • Review
  • Open Access
6 Citations
6,000 Views
25 Pages

Implementing machine learning is imperative for enhancing advanced cybersecurity practices globally. The current cybersecurity landscape needs further investigation into the potential impasse. This scientometric study aims to comprehensively analyse...

  • Article
  • Open Access
4 Citations
5,244 Views
38 Pages

The constant rise of malicious URLs continues to pose significant threats and challenges in cybersecurity, with attackers increasingly evading classical detection methods like blacklists and heuristic-based systems. While machine learning (ML) techni...

  • Article
  • Open Access
154 Citations
12,822 Views
15 Pages

SCADA System Testbed for Cybersecurity Research Using Machine Learning Approach

  • Marcio Andrey Teixeira,
  • Tara Salman,
  • Maede Zolanvari,
  • Raj Jain,
  • Nader Meskin and
  • Mohammed Samaka

This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank’s control system, which is a stage in the process of water treatmen...

  • Article
  • Open Access
61 Citations
13,020 Views
37 Pages

17 March 2022

Machine learning has become widely adopted as a strategy for dealing with a variety of cybersecurity issues, ranging from insider threat detection to intrusion and malware detection. However, by their very nature, machine learning systems can introdu...

  • Article
  • Open Access
6 Citations
2,744 Views
15 Pages

Modelling of Metaheuristics with Machine Learning-Enabled Cybersecurity in Unmanned Aerial Vehicles

  • Mohammed Rizwanullah,
  • Hanan Abdullah Mengash,
  • Mohammad Alamgeer,
  • Khaled Tarmissi,
  • Amira Sayed A. Aziz,
  • Amgad Atta Abdelmageed,
  • Mohamed Ibrahim Alsaid and
  • Mohamed I. Eldesouki

14 December 2022

The adoption and recent development of Unmanned Aerial Vehicles (UAVs) are because of their widespread applications in the private and public sectors, from logistics to environment monitoring. The incorporation of 5G technologies, satellites, and UAV...

  • Article
  • Open Access
60 Citations
14,119 Views
27 Pages

10 November 2021

In many developed countries, the usage of artificial intelligence (AI) and machine learning (ML) has become important in paving the future path in how data is managed and secured in the small and medium enterprises (SMEs) sector. SMEs in these develo...

  • Article
  • Open Access
1 Citations
2,230 Views
54 Pages

The growing sophistication of cyber threats has posed significant challenges for organizations in terms of accurately detecting and responding to incidents in a coordinated manner. Despite advances in the application of machine learning and automatio...

  • Article
  • Open Access
2 Citations
878 Views
31 Pages

14 October 2025

The increasing digitization and decentralization of modern energy systems have heightened their vulnerability to sophisticated cyber threats, necessitating advanced, scalable, and privacy-preserving detection frameworks. This paper introduces a novel...

  • Article
  • Open Access
11 Citations
5,327 Views
30 Pages

Design and Evaluation of Unsupervised Machine Learning Models for Anomaly Detection in Streaming Cybersecurity Logs

  • Carmen Sánchez-Zas,
  • Xavier Larriva-Novo,
  • Víctor A. Villagrá,
  • Mario Sanz Rodrigo and
  • José Ignacio Moreno

31 October 2022

Companies, institutions or governments process large amounts of data for the development of their activities. This knowledge usually comes from devices that collect data from various sources. Processing them in real time is essential to ensure the fl...

  • Article
  • Open Access
27 Citations
6,271 Views
19 Pages

Efficient Distributed Preprocessing Model for Machine Learning-Based Anomaly Detection over Large-Scale Cybersecurity Datasets

  • Xavier Larriva-Novo,
  • Mario Vega-Barbas,
  • Víctor A. Villagrá,
  • Diego Rivera,
  • Manuel Álvarez-Campana and
  • Julio Berrocal

15 May 2020

New computational and technological paradigms that currently guide developments in the information society, i.e., Internet of things, pervasive technology, or Ubicomp, favor the appearance of new intrusion vectors that can directly affect people&rsqu...

  • Article
  • Open Access
47 Citations
6,318 Views
11 Pages

20 April 2023

Machine learning (ML) is efficiently disrupting and modernizing cities in terms of service quality for mobility, security, robotics, healthcare, electricity, finance, etc. Despite their undeniable success, ML algorithms need crucial computational eff...

  • Article
  • Open Access
22 Citations
8,833 Views
16 Pages

A New Approach to Data Analysis Using Machine Learning for Cybersecurity

  • Shivashankar Hiremath,
  • Eeshan Shetty,
  • Allam Jaya Prakash,
  • Suraj Prakash Sahoo,
  • Kiran Kumar Patro,
  • Kandala N. V. P. S. Rajesh and
  • Paweł Pławiak

The internet has become an indispensable tool for organizations, permeating every facet of their operations. Virtually all companies leverage Internet services for diverse purposes, including the digital storage of data in databases and cloud platfor...

  • Article
  • Open Access
2,195 Views
28 Pages

21 November 2025

The convergence of ubiquitous connectivity, large-scale data generation, and rapid advancements in machine learning is transforming the field of cybersecurity. The widespread adoption of interconnected systems including Internet of Things devices, mo...

  • Article
  • Open Access
5 Citations
3,851 Views
11 Pages

29 November 2023

Machine learning algorithms for reverse image search (a subset of open source intelligence or OSINT) provide a free, useful tool for determining the content of an image, where and when it was captured, and, in some cases, whether it has been digitall...

  • Article
  • Open Access
2,409 Views
30 Pages

25 June 2025

Optimizing ambulance deployment is a critical task in emergency medical services (EMS), as it directly affects patient outcomes and system efficiency. This study proposes a cyber-secure, machine learning-based framework for predicting region-specific...

  • Article
  • Open Access
91 Citations
10,579 Views
20 Pages

Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector

  • Mostofa Ahsan,
  • Rahul Gomes,
  • Md. Minhaz Chowdhury and
  • Kendall E. Nygard

21 March 2021

Machine learning algorithms are becoming very efficient in intrusion detection systems with their real time response and adaptive learning process. A robust machine learning model can be deployed for anomaly detection by using a comprehensive dataset...

  • Review
  • Open Access
111 Citations
29,084 Views
34 Pages

Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity

  • Pierpaolo Dini,
  • Abdussalam Elhanashi,
  • Andrea Begni,
  • Sergio Saponara,
  • Qinghe Zheng and
  • Kaouther Gasmi

25 June 2023

The Intrusion Detection System (IDS) is an effective tool utilized in cybersecurity systems to detect and identify intrusion attacks. With the increasing volume of data generation, the possibility of various forms of intrusion attacks also increases....

  • Article
  • Open Access
9 Citations
3,823 Views
14 Pages

Additive manufacturing (AM), also known as three-dimensional (3D) printing, is the process of building a solid object in a layer-wise manner. Cybersecurity is a prevalent issue that appears more and more frequently as AM becomes popular. This paper f...

  • Article
  • Open Access
18 Citations
5,936 Views
16 Pages

14 February 2020

Due to the emergence of online society, a representative user authentication method that is password authentication has been a key topic. However, in this authentication method, various attack techniques have emerged to steal passwords input from the...

  • Article
  • Open Access
14 Citations
4,473 Views
24 Pages

20 February 2024

This study investigates the application of machine learning techniques for cyberattack prevention in Internet of Things (IoT) systems, focusing on the specific context of cyberattacks in Colombia. The research presents a comparative perspective on cy...

  • Review
  • Open Access
2,081 Views
23 Pages

Application of Machine Learning and Deep Learning Techniques for Enhanced Insider Threat Detection in Cybersecurity: Bibliometric Review

  • Hillary Kwame Ofori,
  • Kwame Bell-Dzide,
  • William Leslie Brown-Acquaye,
  • Forgor Lempogo,
  • Samuel O. Frimpong,
  • Israel Edem Agbehadji and
  • Richard C. Millham

11 October 2025

Insider threats remain a persistent challenge in cybersecurity, as malicious or negligent insiders exploit legitimate access to compromise systems and data. This study presents a bibliometric review of 325 peer-reviewed publications from 2015 to 2025...

  • Article
  • Open Access
65 Citations
6,191 Views
15 Pages

Machine Learning-Based Intrusion Detection for Achieving Cybersecurity in Smart Grids Using IEC 61850 GOOSE Messages

  • Taha Selim Ustun,
  • S. M. Suhail Hussain,
  • Ahsen Ulutas,
  • Ahmet Onen,
  • Muhammad M. Roomi and
  • Daisuke Mashima

8 May 2021

Increased connectivity is required to implement novel coordination and control schemes. IEC 61850-based communication solutions have become popular due to many reasons—object-oriented modeling capability, interoperable connectivity and strong communi...

  • Review
  • Open Access
104 Citations
12,278 Views
19 Pages

15 March 2021

Smart grids (SG) emerged as a response to the need to modernize the electricity grid. The current security tools are almost perfect when it comes to identifying and preventing known attacks in the smart grid. Still, unfortunately, they do not quite m...

  • Review
  • Open Access
543 Views
32 Pages

Cybersecurity is a field in which integration of artificial intelligence (AI) represents a significant direction towards protection against cyber threats. This scoping review explores the current impact and future prospects of AI in four key areas of...

  • Article
  • Open Access
27 Citations
4,317 Views
19 Pages

Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems

  • Abdullah Alharbi,
  • Adil Hussain Seh,
  • Wael Alosaimi,
  • Hashem Alyami,
  • Alka Agrawal,
  • Rajeev Kumar and
  • Raees Ahmad Khan

9 November 2021

Machine learning (ML) is one of the dominating technologies practiced in both the industrial and academic domains throughout the world. ML algorithms can examine the threats and respond to intrusions and security incidents swiftly in an instinctive w...

  • Review
  • Open Access
6 Citations
4,511 Views
33 Pages

Due to developments in vehicle engineering and communication technologies, vehicular networks have become an attractive and feasible solution for the future of electric, autonomous, and connected vehicles. Electric autonomous vehicles will require mo...

  • Article
  • Open Access
44 Citations
8,478 Views
19 Pages

2 March 2020

This paper describes the development and implementation of a natural language processing model based on machine learning which performs cognitive analysis for cybersecurity-related documents. A domain ontology was developed using a two-step approach:...

  • Review
  • Open Access
1 Citations
961 Views
22 Pages

10 December 2025

The limitations of conventional rule-based security systems have been exposed by the quick evolution of cyber threats, necessitating more proactive, intelligent, and flexible solutions. In cybersecurity, Artificial Intelligence (AI) has emerged as a...

  • Article
  • Open Access
558 Views
26 Pages

AI-Powered Cybersecurity Models for Training and Testing IoT Devices

  • Samson Quaye,
  • Abdul Hadi Khan,
  • Kshitij Tapre and
  • Maurice Dawson

11 December 2025

The rapid expansion of the Internet of Things (IoT) has introduced a significant attack surface, making robust security solutions essential. Traditional signature-based methods are often inadequate against modern, versatile threats. Consequently, res...

  • Article
  • Open Access
10 Citations
3,873 Views
27 Pages

Construction 4.0 integrates digital technologies that increase vulnerability to cyber threats. A dedicated cyber risk assessment framework is essential for proactive risk mitigation. However, existing studies on this subject within the construction s...

  • Article
  • Open Access
10 Citations
4,331 Views
19 Pages

13 March 2025

The rapid expansion of the Industrial Internet of Things (IIoT) has revolutionized industrial automation and introduced significant cybersecurity challenges, particularly for supervisory control and data acquisition (SCADA) systems. Traditional intru...

  • Article
  • Open Access
3 Citations
6,262 Views
32 Pages

The increasing interconnectivity between physical and cyber-systems has led to more vulnerabilities and cyberattacks. Traditional preventive and detective measures are no longer adequate to defend against adversaries. Artificial Intelligence (AI) is...

  • Article
  • Open Access
8 Citations
5,076 Views
18 Pages

Generative AI-Enhanced Cybersecurity Framework for Enterprise Data Privacy Management

  • Geeta Sandeep Nadella,
  • Santosh Reddy Addula,
  • Akhila Reddy Yadulla,
  • Guna Sekhar Sajja,
  • Mohan Meesala,
  • Mohan Harish Maturi,
  • Karthik Meduri and
  • Hari Gonaygunta

8 February 2025

This study presents a Generative AI-Enhanced Cybersecurity Framework designed to strengthen enterprise data privacy management while improving threat detection accuracy and scalability. By leveraging Generative Adversarial Networks (GANs), Variationa...

  • Review
  • Open Access
34 Citations
11,635 Views
18 Pages

The Comparison of Cybersecurity Datasets

  • Ahmed Alshaibi,
  • Mustafa Al-Ani,
  • Abeer Al-Azzawi,
  • Anton Konev and
  • Alexander Shelupanov

29 January 2022

Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer according to a majority of the sources. In IIoT, different machine learning (ML) and deep learning (DL) techniques are used for building the intrusion detec...

  • Review
  • Open Access
19 Citations
5,660 Views
29 Pages

Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems

  • Samar AboulEla,
  • Nourhan Ibrahim,
  • Sarama Shehmir,
  • Aman Yadav and
  • Rasha Kashef

15 May 2024

The Internet of Things (IoT) is seeing significant growth, as the quantity of interconnected devices in communication networks is on the rise. The increased connectivity of devices has heightened their susceptibility to hackers, underscoring the need...

  • Article
  • Open Access
12 Citations
4,887 Views
24 Pages

27 July 2024

Cyber-security challenges are growing globally and are specifically targeting critical infrastructure. Conventional countermeasure practices are insufficient to provide proactive threat hunting. In this study, random forest (RF), support vector machi...

  • Review
  • Open Access
10 Citations
7,721 Views
34 Pages

Artificial Intelligence in Maritime Cybersecurity: A Systematic Review of AI-Driven Threat Detection and Risk Mitigation Strategies

  • Tymoteusz Miller,
  • Irmina Durlik,
  • Ewelina Kostecka,
  • Sylwia Sokołowska,
  • Polina Kozlovska and
  • Rafał Zwolak

The maritime industry is undergoing a digital transformation, integrating automation, artificial intelligence (AI), and the Internet of Things (IoT) to enhance operational efficiency and safety. However, this technological evolution has also increase...

  • Article
  • Open Access
3 Citations
8,028 Views
27 Pages

Federated Learning for Cybersecurity: A Privacy-Preserving Approach

  • Edi Marian Timofte,
  • Mihai Dimian,
  • Adrian Graur,
  • Alin Dan Potorac,
  • Doru Balan,
  • Ionut Croitoru,
  • Daniel-Florin Hrițcan and
  • Marcel Pușcașu

18 June 2025

The growing number of cyber threats and the implementation of stringent privacy regulations have revealed significant shortcomings in traditional centralized machine learning models, especially in distributed systems like the Internet of Things (IoT)...

  • Article
  • Open Access
20 Citations
4,027 Views
37 Pages

Optimizing Cyber Threat Detection in IoT: A Study of Artificial Bee Colony (ABC)-Based Hyperparameter Tuning for Machine Learning

  • Ayoub Alsarhan,
  • Mahmoud AlJamal,
  • Osama Harfoushi,
  • Mohammad Aljaidi,
  • Malek Mahmoud Barhoush,
  • Noureddin Mansour,
  • Saif Okour,
  • Sarah Abu Ghazalah and
  • Dimah Al-Fraihat

30 September 2024

In the rapidly evolving landscape of the Internet of Things (IoT), cybersecurity remains a critical challenge due to the diverse and complex nature of network traffic and the increasing sophistication of cyber threats. This study investigates the app...

  • Article
  • Open Access
38 Citations
10,247 Views
14 Pages

Classification of Malicious URLs Using Machine Learning

  • Shayan Abad,
  • Hassan Gholamy and
  • Mohammad Aslani

8 September 2023

Amid the rapid proliferation of thousands of new websites daily, distinguishing safe ones from potentially harmful ones has become an increasingly complex task. These websites often collect user data, and, without adequate cybersecurity measures such...

  • Article
  • Open Access
8 Citations
4,125 Views
37 Pages

Integration of Machine Learning-Based Attack Detectors into Defensive Exercises of a 5G Cyber Range

  • Alberto Mozo,
  • Antonio Pastor,
  • Amit Karamchandani,
  • Luis de la Cal,
  • Diego Rivera and
  • Jose Ignacio Moreno

14 October 2022

Cybercrime has become more pervasive and sophisticated over the years. Cyber ranges have emerged as a solution to keep pace with the rapid evolution of cybersecurity threats and attacks. Cyber ranges have evolved to virtual environments that allow va...

  • Article
  • Open Access
294 Citations
24,143 Views
15 Pages

IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model

  • Iqbal H. Sarker,
  • Yoosef B. Abushark,
  • Fawaz Alsolami and
  • Asif Irshad Khan

6 May 2020

Cyber security has recently received enormous attention in today’s security concerns, due to the popularity of the Internet-of-Things (IoT), the tremendous growth of computer networks, and the huge number of relevant applications. Thus, detecti...

  • Feature Paper
  • Review
  • Open Access
292 Citations
39,441 Views
27 Pages

Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review

  • Mujaheed Abdullahi,
  • Yahia Baashar,
  • Hitham Alhussian,
  • Ayed Alwadain,
  • Norshakirah Aziz,
  • Luiz Fernando Capretz and
  • Said Jadid Abdulkadir

In recent years, technology has advanced to the fourth industrial revolution (Industry 4.0), where the Internet of things (IoTs), fog computing, computer security, and cyberattacks have evolved exponentially on a large scale. The rapid development of...

  • Article
  • Open Access
7 Citations
13,057 Views
26 Pages

Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics

  • Dominik Molitor,
  • Wullianallur Raghupathi,
  • Aditya Saharia and
  • Viju Raghupathi

5 November 2023

While data breaches are a frequent and universal phenomenon, the characteristics and dimensions of data breaches are unexplored. In this novel exploratory research, we apply machine learning (ML) and text analytics to a comprehensive collection of da...

  • Article
  • Open Access
2 Citations
1,813 Views
32 Pages

28 September 2025

Critical energy infrastructures (CEIs) are fundamental pillars for economic and social development. However, their accelerated digitalization and the convergence between operational technologies (OTs) and information technologies (ITs) have increased...

of 12