[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review
Providing a high-performance Intrusion Detection System (IDS) can be very effective in
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …
A novel two-stage deep learning model for network intrusion detection: LSTM-AE
Machine learning and deep learning techniques are widely used to evaluate intrusion
detection systems (IDS) capable of rapidly and automatically recognizing and classifying …
detection systems (IDS) capable of rapidly and automatically recognizing and classifying …
Cas-VSwin transformer: A variant swin transformer for surface-defect detection
L Gao, J Zhang, C Yang, Y Zhou - Computers in Industry, 2022 - Elsevier
Surface defect detection using deep learning approaches has become a promising area of
research, but the difficulty of accurately locating and segmenting various forms of defects …
research, but the difficulty of accurately locating and segmenting various forms of defects …
Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model
The fourth industrial revolution is marked by the rapid growth of Internet of Things (IoT)
technology, leading to an increase in the number of IoT devices. Unfortunately, this also …
technology, leading to an increase in the number of IoT devices. Unfortunately, this also …
Detection of malware by deep learning as CNN-LSTM machine learning techniques in real time
MS Akhtar, T Feng - Symmetry, 2022 - mdpi.com
Cyber-attacks on the numerous parts of today's fast develo** IoT are only going to
increase in frequency and severity. A reliable method for detecting malicious attacks such as …
increase in frequency and severity. A reliable method for detecting malicious attacks such as …
[Retracted] Wearable Sensor Data for Classification and Analysis of Functional Fitness Exercises Using Unsupervised Deep Learning Methodologies
P Ajay, R Huang - Security and Communication Networks, 2022 - Wiley Online Library
Healthcare institutions, policymakers, and leaders around the world all agree that improving
people's health and livelihoods is our number one priority. Aging, disability, long‐term care …
people's health and livelihoods is our number one priority. Aging, disability, long‐term care …
Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model
The adoption of cloud computing has become increasingly widespread across various
domains. However, the inherent security vulnerabilities of cloud computing pose significant …
domains. However, the inherent security vulnerabilities of cloud computing pose significant …
Zero-day ransomware attack detection using deep contractive autoencoder and voting based ensemble classifier
Ransomware attacks are hazardous cyber-attacks that use cryptographic methods to hold
victims' data until the ransom is paid. Zero-day ransomware attacks try to exploit new …
victims' data until the ransom is paid. Zero-day ransomware attacks try to exploit new …
A novel network intrusion detection method based on metaheuristic optimisation algorithms
The growing use of the Internet with its vulnerabilities has necessitated the adoption of
Intrusion Detection Systems (IDS) to assure security. IDSs are protective systems that detect …
Intrusion Detection Systems (IDS) to assure security. IDSs are protective systems that detect …