Skip to main content

and
  1. No Access

    Chapter

    Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detection

    Profiling communication patterns between devices in the Industrial Internet of Things (IIoT) ecosystems is important for deploying security measures like detecting anomalies and potential cyber-attacks. In thi...

    Mustafa Amir Faisal, Alvaro A. Cardenas in Security and Privacy Trends in the Industr… (2019)

  2. No Access

    Chapter and Conference Paper

    Augmented Query Strategies for Active Learning in Stream Data Mining

    Active learning is used in situations where the amount of unlabeled data is abundant but it is costly to manually label the data. So, depending on our available budget, from all unlabeled instances we are to s...

    Mustafa Amir Faisal, Zeyar Aung, Wei Lee Woon in Neural Information Processing (2014)

  3. No Access

    Chapter and Conference Paper

    A Novel Ensemble Learning-Based Approach for Click Fraud Detection in Mobile Advertising

    By diverting funds away from legitimate partners (a.k.a publishers), click fraud represents a serious drain on advertising budgets and can seriously harm the viability of the internet advertising market. As su...

    Kasun S. Perera, Bijay Neupane in Mining Intelligence and Knowledge Explorat… (2013)

  4. No Access

    Chapter and Conference Paper

    Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining

    Advanced metering infrastructure (AMI) is an imperative component of the smart grid, as it is responsible for collecting, measuring, analyzing energy usage data, and transmitting these data to the data concent...

    Mustafa Amir Faisal, Zeyar Aung, John R. Williams in Intelligence and Security Informatics (2012)