Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann… - The Geneva papers …, 2022 - pmc.ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks

W Ding, M Abdel-Basset, R Mohamed - Information Sciences, 2023 - Elsevier
Our daily lives have been profoundly changed over the past few years owing to the growing
presence of the Internet of Things (IoT). Importantly, IoT makes our lives more convenient …

DroidRL: Feature selection for android malware detection with reinforcement learning

Y Wu, M Li, Q Zeng, T Yang, J Wang, Z Fang… - Computers & …, 2023 - Elsevier
Due to the completely open-source nature of Android, the exploitable vulnerability of
malware attacks is increasing. Machine learning, leading to a great evolution in Android …

[HTML][HTML] Joint optimization of UAV-IRS placement and resource allocation for wireless powered mobile edge computing networks

M Ahmed, HM Alshahrani, N Alruwais, MM Asiri… - Journal of King Saud …, 2023 - Elsevier
The rapid evolution of communication systems towards the next generation has led to an
increased deployment of Internet of Things (IoT) devices for various real-time applications …

A dynamic robust DL-based model for android malware detection

IU Haq, TA Khan, A Akhunzada - IEEE Access, 2021 - ieeexplore.ieee.org
The dramatic increase in Android-based smart devices has brought technological revolution
to improve the overall quality of life and thus making it worth a billion-dollar market. Despite …

Estimation of the shear strength of UHPC beams via interpretable deep learning models: Comparison of different optimization techniques

F Ergen, M Katlav - Materials Today Communications, 2024 - Elsevier
In this article, optimized deep learning (DL) models with different algorithms are adopted to
estimate the shear strength of rectangular ultra-high performance concrete beams (UHPC …

Deep AI-powered cyber threat analysis in IIoT

I Bibi, A Akhunzada, N Kumar - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Distributed Industrial Internet of Things (IIoT) has entirely revolutionized the industrial sector
that varies from autonomous industrial processes to automation of processes without human …

RETRACTED ARTICLE: Toward trustworthy human suspicious activity detection from surveillance videos using deep learning

AM Buttar, M Bano, MA Akbar, A Alabrah, AH Gumaei - Soft Computing, 2024 - Springer
In today's world, suspicious or unusual activities express threats and danger to others. For
the prevention of various security issues, an automatic video detection system is very …

A hybrid DL-based detection mechanism for cyber threats in secure networks

S Qureshi, J He, S Tunio, N Zhu, F Akhtar, F Ullah… - Ieee …, 2021 - ieeexplore.ieee.org
The astonishing growth of sophisticated ever-evolving cyber threats and attacks throws the
entire Internet-of-Things (IoT) infrastructure into chaos. As the IoT belongs to the …

[HTML][HTML] An Explainable Deep Learning Approach for Classifying Monkeypox Disease by Leveraging Skin Lesion Image Data

A Maseleno, M Huda… - Emerging Science …, 2024 - ijournalse.org
Abstract According to the World Health Organization's (WHO) external situation report on the
multi-country outbreak of Monkeypox in 2023, from 11 countries in Southeast Asia Regions …