Security and Privacy,
Journal Year:
2024,
Volume and Issue:
7(6)
Published: May 19, 2024
Abstract
Nowadays,
the
prediction
of
cryptocurrency
side
effects
on
critical
aspects
exchange
rates
in
intelligent
business
is
one
main
challenges
financial
market.
Cryptocurrency
defined
as
a
set
digital
information
concerning
internal
protocols
marketing,
such
blockchain,
which
operates
according
to
decentralized
architecture.
On
other
hand,
fraud
activities
Ethereum
transfer
and
management
now
increase
affect
safe
transactional
processes.
This
article
presents
new
machine‐learning
approach
Detection
based
Bayesian
Optimizable
Ensemble
Bagged
Trees
(BOEBT)
algorithm.
Moreover,
goal
this
study
derive
accuracy
model
using
different
algorithms
compare
their
evaluation
parameters
together.
The
performance
proposed
machine
learning
was
evaluated
by
MATLAB
tool.
experimental
results
show
that
BOEBT
algorithm
merits
achieving
99.21%
99.14%
F1‐Score
for
prediction.
Processes,
Journal Year:
2025,
Volume and Issue:
13(3), P. 832 - 832
Published: March 12, 2025
Industrial
robotics
has
shifted
from
rigid,
task-specific
tools
to
adaptive,
intelligent
systems
powered
by
artificial
intelligence
(AI),
machine
learning
(ML),
and
sensor
integration,
revolutionizing
efficiency
human–robot
collaboration
across
manufacturing,
healthcare,
logistics,
agriculture.
Collaborative
robots
(cobots)
slash
assembly
times
30%
boost
quality
15%,
while
reinforcement
enhances
autonomy,
cutting
errors
energy
use
20%.
Yet,
this
review
transcends
descriptive
summaries,
critically
synthesizing
these
trends
expose
unresolved
tensions
in
scalability,
cost,
societal
impact.
High
implementation
costs
legacy
system
incompatibilities
hinder
adoption,
particularly
for
SMEs,
interoperability
gaps—despite
frameworks,
like
OPC
UA—stifle
multi-vendor
ecosystems.
Ethical
challenges,
including
workforce
displacement
cybersecurity
risks,
further
complicate
progress,
underscoring
a
fragmented
field
where
innovation
outpaces
practical
integration.
Drawing
on
systematic
of
high-impact
literature,
study
uniquely
bridges
technological
advancements
with
interdisciplinary
applications,
revealing
disparities
economic
feasibility
equitable
access.
It
critiques
the
literature’s
isolation
trends—cobots’
safety,
ML’s
perception’s
precision—proposing
following
cohesive
research
directions:
cost-effective
modularity,
standardized
protocols,
ethical
frameworks.
By
prioritizing
interoperability,
sustainability,
paper
charts
path
evolve
inclusively,
offering
actionable
insights
researchers,
practitioners,
policymakers
navigating
dynamic
landscape.
Journal of Edge Computing,
Journal Year:
2025,
Volume and Issue:
unknown
Published: April 15, 2025
The
role
of
Intrusion
Detection
Systems
(IDS)
in
the
protection
against
increasing
variety
cybersecurity
threats
complex
environments,
including
Internet
Things
(IoT),
cloud
computing,
and
industrial
networks.
This
study
evaluates
existing
state-of-the-art
IDS
methodologies
using
Deep
Learning
(DL)
approaches,
advanced
feature
engineering
techniques.
research
also
highlights
success
models
such
as
Genetic
Algorithms
(GA),
Particle
Swarm
Optimization
(PSO),
Explainable
AI
(XAI)
improving
detection
accuracy
well
computational
efficiency
interoperability.
Blockchain
quantum
computing
technologies
are
explored
to
improve
data
privacy,
resilience,
scalability
decentralized
resource-constrained
environments.
work
primarily
identifies
key
challenges,
real-time
anomaly
detection,
adversarial
robustness,
imbalance
datasets,
assist
researchers
investigating
further
opportunities.
Focusing
on
future
filling
these
gaps,
proceeds
toward
developing
lightweight,
adaptive,
ethical
frameworks
that
can
operate
across
dynamic
heterogeneous
In
this
paper,
opportunities,
strategies
critically
synthesized
create
a
useful
resource
for
academics,
researchers,
industry
practitioners.
Research Square (Research Square),
Journal Year:
2025,
Volume and Issue:
unknown
Published: April 10, 2025
Abstract
The
integrity
of
network
infrastructure
against
malicious
exploit
attacks
relies
mostly
on
Intrusion
Detection
Systems
(IDS).
These
techniques
are
very
essential
for
identifying
and
lowering
threats
before
they
start
to
cause
significant
damage.
This
manuscript
evaluates
three
advanced
Machine
Learning
(ML)
models
CatBoost,
XGBoost,
Long
Short-Term
Memory
(LSTM)
a
real-world
traffic
dataset
determine
their
suitability
IDS
applications.
Every
model
is
evaluated
using
key
metrics:
accuracy,
precision,
recall,
F1-score,
error
measures
including
Root
Mean
Squared
Error
(RMSE)
(MSE).
Based
the
results,
Catboost
exceeds
other
with
98.55%
accuracy
lowest
rates.
Given
CatBoost's
remarkable
performance,
it
fitting
real-time
systems
where
reducing
false
positives
negatives
extremely
crucial.
XGBoost
provides
balanced
computationally
affordable
solution
even
if
significantly
less
accurate;
ideal
scenarios
requiring
fast
responses
limited
resources.
Strong
in
sequential
pattern
recognition,
LSTM
has
higher
rate
positives,
suggesting
that
further
tuning
needed
improve
its
overall
reliability
surroundings.
possibility
enhancing
performance
gradient
boosting
such
as
CatBoost
cybersecurity
underlined
this
study.
Decision Analytics Journal,
Journal Year:
2024,
Volume and Issue:
11, P. 100478 - 100478
Published: May 15, 2024
The
rapid
increase
in
online
risks
is
a
reflection
of
the
exponential
growth
Internet
Things
(IoT)
networks.
Researchers
have
proposed
numerous
intrusion
detection
techniques
to
mitigate
harm
caused
by
these
threats.
Enterprises
use
systems
(IDSs)
and
prevention
(IPSs)
keep
their
networks
safe,
stable,
accessible.
Network
solutions
lately
integrated
powerful
Machine
Learning
(ML)
safeguard
IoT
Selecting
proper
data
features
for
effectively
training
such
ML
models
critical
maximizing
accuracy
computational
efficiency.
However,
efficiency
degrades
high-dimensional
spaces,
it
crucial
suitable
feature
extraction
method
eliminate
extraneous
from
classification
procedure.
false
positive
rate
many
ML-based
IDSs
also
rise
when
samples
used
train
are
unbalanced.
This
study
provides
detailed
overview
UNSW-NB15(DS-1)
NF-UNSWNB15(DS-2)
datasets
detection,
which
will
be
utilized
develop
evaluate
our
models.
In
addition,
this
model
uses
MaxAbsScaler
algorithm
implement
filter-based
scaling
strategy
.
Then,
condensed
set
perform
several
techniques,
including
Support
Vector
Machines
(SVM),
K-nearest
neighbors
(KNN),
Logistic
Regression
(LR),
Naive
Bayes
(NB),
Decision
Tree
(DT),
Random
Forest
(RF),
considering
multiclass
classification.
Accuracy
tests
scheme
were
improved
60%
94%
using
MaxAbsScaler-based
method.