Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration

T McIntosh, T Susnjak, T Liu, D Xu, P Watters… - ACM Computing …, 2024 - dl.acm.org
Ransomware has grown to be a dominant cybersecurity threat by exfiltrating, encrypting, or
destroying valuable user data and causing numerous disruptions to victims. The severity of …

Medical image analysis using deep learning algorithms

M Li, Y Jiang, Y Zhang, H Zhu - Frontiers in public health, 2023 - frontiersin.org
In the field of medical image analysis within deep learning (DL), the importance of
employing advanced DL techniques cannot be overstated. DL has achieved impressive …

The deep learning applications in IoT-based bio-and medical informatics: a systematic literature review

Z Amiri, A Heidari, NJ Navimipour… - Neural Computing and …, 2024 - Springer
Nowadays, machine learning (ML) has attained a high level of achievement in many
contexts. Considering the significance of ML in medical and bioinformatics owing to its …

Trends in using deep learning algorithms in biomedical prediction systems

Y Wang, L Liu, C Wang - Frontiers in Neuroscience, 2023 - frontiersin.org
In the domain of using DL-based methods in medical and healthcare prediction systems, the
utilization of state-of-the-art deep learning (DL) methodologies assumes paramount …

[HTML][HTML] Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey

F Nawshin, R Gad, D Unal, AK Al-Ali… - Computers and Electrical …, 2024 - Elsevier
Mobile devices have become an essential element in our day-to-day lives. The chances of
mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting …

ML‐DDoSnet: IoT intrusion detection based on denial‐of‐service attacks using machine learning methods and NSL‐KDD

M Esmaeili, SH Goki, BHK Masjidi… - Wireless …, 2022 - Wiley Online Library
The Internet of Things (IoT) is a complicated security feature in which datagrams are
protected by integrity, confidentiality, and authentication services. The network is protected …

[HTML][HTML] Android ransomware detection using supervised machine learning techniques based on traffic analysis

A Albin Ahmed, A Shaahid, F Alnasser, S Alfaddagh… - Sensors, 2023 - mdpi.com
In today's digitalized era, the usage of Android devices is being extensively witnessed in
various sectors. Cybercriminals inevitably adapt to new security technologies and utilize …

TOPSIS-based comprehensive measure of variable importance in predictive modelling

S **e, J Zhang - Expert Systems with Applications, 2023 - Elsevier
The real-world complex systems of transportation and insurance constantly produce
massive data, and the number of variables used to capture these systems can sometimes be …

Hybrid Android malware detection: A Review of heuristic-based approach

RA Yunmar, SS Kusumawardani, F Mohsen - IEEE Access, 2024 - ieeexplore.ieee.org
Over the last decade, numerous research efforts have been dedicated to countering
malicious mobile applications. Given its market share, Android OS has been the primary …

Distributed optimization of heterogeneous UAV cluster PID controller based on machine learning

L Yan, JL Webber, A Mehbodniya, B Moorthy… - Computers and …, 2022 - Elsevier
To resolve the problem of membership value and the control effect reliant on expert
knowledge, a PID control approach based on an adaptive fuzzy PID-UAV attitude controller …