Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration

T McIntosh, T Susnjak, T Liu, D Xu, P Watters… - ACM Computing …, 2024 - dl.acm.org
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …

Medical image analysis using deep learning algorithms

M Li, Y Jiang, Y Zhang, H Zhu - Frontiers in Public Health, 2023 - frontiersin.org
In the field of medical image analysis within deep learning (DL), the importance of
employing advanced DL techniques cannot be overstated. DL has achieved impressive …

ML‐DDoSnet: IoT intrusion detection based on denial‐of‐service attacks using machine learning methods and NSL‐KDD

M Esmaeili, SH Goki, BHK Masjidi… - Wireless …, 2022 - Wiley Online Library
The Internet of Things (IoT) is a complicated security feature in which datagrams are
protected by integrity, confidentiality, and authentication services. The network is protected …

Trends in using deep learning algorithms in biomedical prediction systems

Y Wang, L Liu, C Wang - Frontiers in Neuroscience, 2023 - frontiersin.org
In the domain of using DL-based methods in medical and healthcare prediction systems, the
utilization of state-of-the-art deep learning (DL) methodologies assumes paramount …

The deep learning applications in IoT-based bio-and medical informatics: a systematic literature review

Z Amiri, A Heidari, NJ Navimipour… - Neural Computing and …, 2024 - Springer
Nowadays, machine learning (ML) has attained a high level of achievement in many
contexts. Considering the significance of ML in medical and bioinformatics owing to its …

[Retracted] Towards Development of Machine Learning Framework for Enhancing Security in Internet of Things

M Paricherla, S Babu, K Phasinam… - Security and …, 2022 - Wiley Online Library
An IoT system is a smart network that connects all items to the Internet and exchanges data
using Internet Engineering Task Force established protocols. As a consequence, everything …

Distributed optimization of heterogeneous UAV cluster PID controller based on machine learning

L Yan, JL Webber, A Mehbodniya, B Moorthy… - Computers and …, 2022 - Elsevier
To resolve the problem of membership value and the control effect reliant on expert
knowledge, a PID control approach based on an adaptive fuzzy PID-UAV attitude controller …

[HTML][HTML] Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey

F Nawshin, R Gad, D Unal, AK Al-Ali… - Computers and Electrical …, 2024 - Elsevier
Mobile devices have become an essential element in our day-to-day lives. The chances of
mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting …

The Future Development Direction of Cloud‐Associated Edge‐Computing Security in the Era of 5G as Edge Intelligence

OR Devi, J Webber, A Mehbodniya… - Scientific …, 2022 - Wiley Online Library
By introducing the Internet‐of‐Everything, new usage situations such as self‐directed
movement and vivid competitions constructed upon Virtual Reality or Augmented Reality …

Android ransomware detection using supervised machine learning techniques based on traffic analysis

A Albin Ahmed, A Shaahid, F Alnasser, S Alfaddagh… - Sensors, 2023 - mdpi.com
In today's digitalized era, the usage of Android devices is being extensively witnessed in
various sectors. Cybercriminals inevitably adapt to new security technologies and utilize …