A survey of android malware detection with deep neural models
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber
security research. Deep learning models have many advantages over traditional Machine …
security research. Deep learning models have many advantages over traditional Machine …
Machine learning based solutions for security of Internet of Things (IoT): A survey
Over the last decade, IoT platforms have been developed into a global giant that grabs every
aspect of our daily lives by advancing human life with its unaccountable smart services …
aspect of our daily lives by advancing human life with its unaccountable smart services …
A review of android malware detection approaches based on machine learning
K Liu, S Xu, G Xu, M Zhang, D Sun, H Liu - IEEE access, 2020 - ieeexplore.ieee.org
Android applications are develo** rapidly across the mobile ecosystem, but Android
malware is also emerging in an endless stream. Many researchers have studied the …
malware is also emerging in an endless stream. Many researchers have studied the …
Network intrusion detection for IoT security based on learning techniques
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …
A survey of machine and deep learning methods for internet of things (IoT) security
The Internet of Things (IoT) integrates billions of smart devices that can communicate with
one another with minimal human intervention. IoT is one of the fastest develo** fields in …
one another with minimal human intervention. IoT is one of the fastest develo** fields in …
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …
A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions
The Internet of Things (IoT) is poised to impact several aspects of our lives with its fast
proliferation in many areas such as wearable devices, smart sensors and home appliances …
proliferation in many areas such as wearable devices, smart sensors and home appliances …
A detailed investigation and analysis of using machine learning techniques for intrusion detection
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …
significant number of techniques have been developed which are based on machine …
The age of ransomware: A survey on the evolution, taxonomy, and research directions
The proliferation of ransomware has become a significant threat to cybersecurity in recent
years, causing significant financial, reputational, and operational damage to individuals and …
years, causing significant financial, reputational, and operational damage to individuals and …
Application of deep learning to cybersecurity: A survey
Abstract Cutting edge Deep Learning (DL) techniques have been widely applied to areas
like image processing and speech recognition so far. Likewise, some DL work has been …
like image processing and speech recognition so far. Likewise, some DL work has been …