Journal articles on the topic 'Critical infrastructure Machine Learning'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Critical infrastructure Machine Learning.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ashwini Kumar Verma. "Malware Detection in Critical Infrastructure using Machine Learning." Power System Technology 49, no. 1 (2025): 145–63. https://doi.org/10.52783/pst.1420.
Full textMoradpoor, Naghmeh, Ezra Abah, Andres Robles-Durazno, and Leandros Maglaras. "Adversarial Attacks on Supervised Energy-Based Anomaly Detection in Clean Water Systems." Electronics 14, no. 3 (2025): 639. https://doi.org/10.3390/electronics14030639.
Full textKumar, Avinash, and Jairo A. Gutierrez. "Impact of Machine Learning on Intrusion Detection Systems for the Protection of Critical Infrastructure." Information 16, no. 7 (2025): 515. https://doi.org/10.3390/info16070515.
Full textKalaskar, Chetankumar, and S. Thangam. "Fault Tolerance of Cloud Infrastructure with Machine Learning." Cybernetics and Information Technologies 23, no. 4 (2023): 26–50. http://dx.doi.org/10.2478/cait-2023-0034.
Full textSiddiqui, Muhammad Rawish. "Harnessing Big Data for Machine Learning (Strategies, Approaches, and Challenges)." Journal of Electrical Electronics Engineering 3, no. 6 (2024): 01–02. http://dx.doi.org/10.33140/jeee.03.06.01.
Full textPadmanaban, Harish. "Machine Learning Algorithms Scaling on Large-Scale Data Infrastructure." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 1–26. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p26.
Full textPadmanaban, Harish. "Machine Learning Algorithms Scaling on Large-Scale Data Infrastructure." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, no. 1 (2024): 171–96. http://dx.doi.org/10.60087/jaigs.v3i1.113.
Full textRafeeq War, Muhammed, Yashwant Singh, Zakir Ahmad Sheikh, and Pradeep Kumar Singh. "Review on the Use of Federated Learning Models for the Security of Cyber-Physical Systems." Scalable Computing: Practice and Experience 26, no. 1 (2025): 16–33. https://doi.org/10.12694/scpe.v26i1.3438.
Full textKalnawat, Aarti, Dharmesh Dhabliya, Kasichainula Vydehi, Anishkumar Dhablia, and Santosh D. Kumar. "Safeguarding Critical Infrastructures: Machine Learning in Cybersecurity." E3S Web of Conferences 491 (2024): 02025. http://dx.doi.org/10.1051/e3sconf/202449102025.
Full textAbbagalla, Sindhooja, and Srividhya Gavini. "SMART SECURITY SOLUTIONS FOR CLOUD INFRASTRUCTURE USING MACHINE LEARNING." International Journal of Interpreting Enigma Engineers 01, no. 02 (2024): 08–14. http://dx.doi.org/10.62674/ijiee.2024.v1i02.002.
Full textOkusi, Oluwatobiloba. "Leveraging AI and Machine Learning for the Protection of Critical National Infrastructure." Asian Journal of Research in Computer Science 17, no. 10 (2024): 1–11. http://dx.doi.org/10.9734/ajrcos/2024/v17i10505.
Full textKumar, Ajit, Neetesh Saxena, Souhwan Jung, and Bong Jun Choi. "Improving Detection of False Data Injection Attacks Using Machine Learning with Feature Selection and Oversampling." Energies 15, no. 1 (2021): 212. http://dx.doi.org/10.3390/en15010212.
Full textSoni, Neha. "Impact of AI and Machine Learning on Supply Chain Optimization in Developing Economies." Journal of Technology Management for Growing Economies 14, no. 2 (2023): 1–7. https://doi.org/10.15415/jtmge/2023.142001.
Full textMohammed, Abdul Muqtadir. "Scalable AI: Leveraging Cloud Infrastructure for Large-Scale Machine Learning." International Journal of Advances in Engineering and Management 7, no. 2 (2025): 382–90. https://doi.org/10.35629/5252-0702382390.
Full textO’Donnell, William, David Mahon, Guangliang Yang, and Simon Gardner. "Muographic Image Upsampling with Machine Learning for Built Infrastructure Applications." Particles 8, no. 1 (2025): 33. https://doi.org/10.3390/particles8010033.
Full textPasupuleti, Murali Krishna. "ecuring Critical Infrastructure with World Models that Learn from Real-World Sensor and Activity Logs." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 234–42. https://doi.org/10.62311/nesx/rp1825.
Full textShan, Ali, and Seunghwan Myeong. "Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application." Sensors 24, no. 15 (2024): 4888. http://dx.doi.org/10.3390/s24154888.
Full textTapash, Paul, and Saha Jay. "Predictive Maintenance of Railway Point Machine Using Machine Learning Algorithm." International Journal of Innovative Science and Research Technology 8, no. 4 (2023): 1–3. https://doi.org/10.5281/zenodo.7811159.
Full textBhanuprakash, Madupati. "Machine Learning for Cybersecurity in Industrial Control Systems (ICS)." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 8, no. 1 (2020): 1–14. https://doi.org/10.5281/zenodo.14208812.
Full textHarish, Keerthi B., W. Nicholson Price, and Yindalon Aphinyanaphongs. "Open-Source Clinical Machine Learning Models: Critical Appraisal of Feasibility, Advantages, and Challenges." JMIR Formative Research 6, no. 4 (2022): e33970. http://dx.doi.org/10.2196/33970.
Full textI. Selim, Gamal Eldin, EZZ El-Din Hemdan, Ahmed M. Shehata, and Nawal A. El-Fishawy. "Anomaly Activities Detection System in Critical Water SCADA Infrastructure Using Machine Learning Techniques." Menoufia Journal of Electronic Engineering Research 28, no. 1 (2019): 343–84. http://dx.doi.org/10.21608/mjeer.2019.69027.
Full textD, JYOTHI, M.A.H FARQUAD Dr., and G. NARSIMHA Dr. "A NETWORK SECURITY FRAMEWORK FOR HYBRID BOTNET DETECTION IN CRITICAL INFRASTRUCTURE BY USING MACHINE LEARNING ALGORITHMS." Tianjin Daxue Xuebao (Ziran Kexue yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology 56, no. 01 (2023): 251–67. https://doi.org/10.5281/zenodo.8285603.
Full textRUPADEVI, RUPADEVI. "Electric Vehicle Energy Demand Prediction: A Critical and Systematic Overview." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem03035.
Full textChevuri, Rajeev Reddy. "Demystifying MLOps: Core Principles for Scalable Machine Learning." International Journal of Advances in Engineering and Management 7, no. 3 (2025): 884–90. https://doi.org/10.35629/5252-0703884890.
Full textAragonés Lozano, Mario, Israel Pérez Llopis, and Manuel Esteve Domingo. "Threat Hunting System for Protecting Critical Infrastructures Using a Machine Learning Approach." Mathematics 11, no. 16 (2023): 3448. http://dx.doi.org/10.3390/math11163448.
Full textArmaan Siddiqui. "Property Price Prediction Using Machine Learning." Journal of Information Systems Engineering and Management 10, no. 41s (2025): 625–32. https://doi.org/10.52783/jisem.v10i41s.7980.
Full textBobowska, Barbara, Michał Choraś, and Michał Woźniak. "Advanced Analysis of Data Streams for Critical Infrastructures Protection and Cybersecurity." JUCS - Journal of Universal Computer Science 24, no. (5) (2018): 622–33. https://doi.org/10.3217/jucs-024-05-0622.
Full textKelli, Vasiliki, Vasileios Argyriou, Thomas Lagkas, George Fragulis, Elisavet Grigoriou, and Panagiotis Sarigiannidis. "IDS for Industrial Applications: A Federated Learning Approach with Active Personalization." Sensors 21, no. 20 (2021): 6743. http://dx.doi.org/10.3390/s21206743.
Full textSwapnil Chawande. "AI-driven threat modeling for critical infrastructure." World Journal of Advanced Engineering Technology and Sciences 13, no. 1 (2024): 1142–55. https://doi.org/10.30574/wjaets.2024.13.1.0476.
Full textChittibala, Dinesh Reddy, and Srujan Reddy Jabbireddy. "Security in Machine Learning (ML) Workflows." International Journal of Computing and Engineering 5, no. 1 (2024): 52–63. http://dx.doi.org/10.47941/ijce.1714.
Full textImteaj, Ahmed, Irfan Khan, Javad Khazaei, and Mohammad Hadi Amini. "FedResilience: A Federated Learning Application to Improve Resilience of Resource-Constrained Critical Infrastructures." Electronics 10, no. 16 (2021): 1917. http://dx.doi.org/10.3390/electronics10161917.
Full textVerma, Saurabh, Pankaj Pali, Pavani Kori, and Muskan Tiwari. "Advanced Threat Detection Systems for Protecting Critical Infrastructure." International Journal of Innovative Research in Computer and Communication Engineering 11, no. 06 (2023): 8896–901. http://dx.doi.org/10.15680/ijircce.2023.1106077.
Full textHallowe Andrew. "Botnets and Critical Infrastructure Security: A Survey." GSC Advanced Research and Reviews 22, no. 1 (2025): 330–61. https://doi.org/10.30574/gscarr.2025.22.1.0445.
Full textAlmaleh, Abdulaziz, and David Tipper. "Risk-Based Criticality Assessment for Smart Critical Infrastructures." Infrastructures 7, no. 1 (2021): 3. http://dx.doi.org/10.3390/infrastructures7010003.
Full textNoetzold, Darlan, Anubis G. D. M. Rossetto, Valderi R. Q. Leithardt, and Humberto J. de M. Costa. "Enhancing Infrastructure Observability: Machine Learning for Proactive Monitoring and Anomaly Detection." Journal of Internet Services and Applications 15, no. 1 (2024): 508–22. https://doi.org/10.5753/jisa.2024.4509.
Full textPanagiotis, Fountas, Kouskouras Taxiarxchis, Kranas Georgios, Leandros Maglaras, and Mohamed Amine Ferrag. "Intrusion Detection in Critical Infrastructures: A Literature Review." Smart Cities 4, no. 3 (2021): 1146–57. http://dx.doi.org/10.3390/smartcities4030061.
Full textSamudra, Shreyas, Mohamed Barbosh, and Ayan Sadhu. "Machine Learning-Assisted Improved Anomaly Detection for Structural Health Monitoring." Sensors 23, no. 7 (2023): 3365. http://dx.doi.org/10.3390/s23073365.
Full textRaman, Gauthama, and Aditya Mathur. "Fusing Design and Machine Learning for Anomaly Detection in Water Treatment Plants." Electronics 13, no. 12 (2024): 2267. http://dx.doi.org/10.3390/electronics13122267.
Full textAnkita Sappa. "Adaptive Machine Learning Algorithms for Anomaly Detection in Enterprise IT Infrastructure." Research Briefs on Information and Communication Technology Evolution 9 (December 30, 2023): 206–27. https://doi.org/10.69978/rebicte.v9i.201.
Full textMmaduekwe, Ebuka. "AI-Driven Cyber Threat Detection for Securing National Critical Infrastructure." Asian Journal of Research in Computer Science 18, no. 6 (2025): 424–31. https://doi.org/10.9734/ajrcos/2025/v18i6711.
Full textNikitin, Petr Vladimirovich, and Rimma Ivanovna Gorokhova. "Analysis of modern intelligent methods for protecting critical information infrastructure." Вопросы безопасности, no. 3 (March 2024): 14–38. http://dx.doi.org/10.25136/2409-7543.2024.3.69980.
Full textBHAVANA, N. "Flood and Landslide Prediction using Machine Learning." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03903.
Full textRamya Boorugula. "Demystifying Data Pipelines: A Beginner's Guide to ML Data Infrastructure." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 470–75. https://doi.org/10.32996/jcsts.2025.7.3.53.
Full textAbubakar, Mansir, Alwatben Batoul Rashed, Mohamad Yusof Darus, and Armayau Z. Umar. "INTELLIGENT MODELS FOR INTRUSION DETECTION OVER CLOUD INFRASTRUCTURE: A LITERATURE REVIEW." Journal of Information System and Technology Management 10, no. 38 (2025): 162–80. https://doi.org/10.35631/jistm.1038011.
Full textLysov, Bogdan, Vira Huskova, Tetiana Prosiankina-Zharova, and Artem Khalygov. "Information technology for the classification of data monitoring systems and data transmission networks for cyber threat detection." Bulletin of the National Technical University "KhPI" A series of "Information and Modeling" 1, no. 1 (13) (2025): 129–47. https://doi.org/10.20998/2411-0558.2025.01.09.
Full textBandukda, Zoya, Muhammad Ahmed Abid, Muhammad Talha Akhtar, Muhammad Nawaz, and Tahir Mehmood. "Pakistan’s Cyber Defense Revolution: AI & Machine Learning for Threat Mitigation." Advance Social Science Archive Journal 4, no. 1 (2025): 38–47. https://doi.org/10.55966/assaj.2025.4.1.041.
Full textDr., Suman Jain. "Optimization Techniques in Machine Learning and Artificial Intelligence." International Journal on Science and Technology 3, no. 4 (2012): 1–10. https://doi.org/10.5281/zenodo.15363878.
Full textB. Rupadevi and Sambaiahpalem Adikesavulu. "Electric Vehicle Energy Demand Prediction Techniques: A Critical and Systematic Review." International Research Journal of Innovations in Engineering and Technology 09, Special Issue ICCIS (2025): 98–101. https://doi.org/10.47001/irjiet/2025.iccis-202515.
Full textBae, Junseo, Sang-Guk Yum, and Ji-Myong Kim. "Harnessing Machine Learning for Classifying Economic Damage Trends in Transportation Infrastructure Projects." Sustainability 13, no. 11 (2021): 6376. http://dx.doi.org/10.3390/su13116376.
Full textXu, Chongchong, Zhicheng Liao, Chaojie Li, Xiaojun Zhou, and Renyou Xie. "Review on Interpretable Machine Learning in Smart Grid." Energies 15, no. 12 (2022): 4427. http://dx.doi.org/10.3390/en15124427.
Full text