[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review

SW Lee, M Mohammadi, S Rashidi… - Journal of Network and …, 2021 - Elsevier
Providing a high-performance Intrusion Detection System (IDS) can be very effective in
controlling malicious behaviors and cyber-attacks. Regarding the ever-growing negative …

A novel two-stage deep learning model for network intrusion detection: LSTM-AE

V Hnamte, H Nhung-Nguyen, J Hussain… - Ieee …, 2023 - ieeexplore.ieee.org
Machine learning and deep learning techniques are widely used to evaluate intrusion
detection systems (IDS) capable of rapidly and automatically recognizing and classifying …

Cas-VSwin transformer: A variant swin transformer for surface-defect detection

L Gao, J Zhang, C Yang, Y Zhou - Computers in Industry, 2022 - Elsevier
Surface defect detection using deep learning approaches has become a promising area of
research, but the difficulty of accurately locating and segmenting various forms of defects …

Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model

XH Nguyen, KH Le - Internet of Things, 2023 - Elsevier
The fourth industrial revolution is marked by the rapid growth of Internet of Things (IoT)
technology, leading to an increase in the number of IoT devices. Unfortunately, this also …

Detection of malware by deep learning as CNN-LSTM machine learning techniques in real time

MS Akhtar, T Feng - Symmetry, 2022 - mdpi.com
Cyber-attacks on the numerous parts of today's fast develo** IoT are only going to
increase in frequency and severity. A reliable method for detecting malicious attacks such as …

[Retracted] Wearable Sensor Data for Classification and Analysis of Functional Fitness Exercises Using Unsupervised Deep Learning Methodologies

P Ajay, R Huang - Security and Communication Networks, 2022 - Wiley Online Library
Healthcare institutions, policymakers, and leaders around the world all agree that improving
people's health and livelihoods is our number one priority. Aging, disability, long‐term care …

Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model

M Bakro, RR Kumar, M Husain, Z Ashraf, A Ali… - IEEE …, 2024 - ieeexplore.ieee.org
The adoption of cloud computing has become increasingly widespread across various
domains. However, the inherent security vulnerabilities of cloud computing pose significant …

Zero-day ransomware attack detection using deep contractive autoencoder and voting based ensemble classifier

U Zahoora, M Rajarajan, Z Pan, A Khan - Applied Intelligence, 2022 - Springer
Ransomware attacks are hazardous cyber-attacks that use cryptographic methods to hold
victims' data until the ransom is paid. Zero-day ransomware attacks try to exploit new …

A novel network intrusion detection method based on metaheuristic optimisation algorithms

R Ghanbarzadeh, A Hosseinalipour… - Journal of ambient …, 2023 - Springer
The growing use of the Internet with its vulnerabilities has necessitated the adoption of
Intrusion Detection Systems (IDS) to assure security. IDSs are protective systems that detect …