A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions

M Ozkan-Okay, E Akin, Ö Aslan, S Kosunalp… - IEEe …, 2024 - ieeexplore.ieee.org
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence
methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement …

A survey on deep learning for cybersecurity: Progress, challenges, and opportunities

M Macas, C Wu, W Fuertes - Computer Networks, 2022 - Elsevier
As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …

Advancing cybersecurity: a comprehensive review of AI-driven detection techniques

AH Salem, SM Azzam, OE Emam, AA Abohany - Journal of Big Data, 2024 - Springer
As the number and cleverness of cyber-attacks keep increasing rapidly, it's more important
than ever to have good ways to detect and prevent them. Recognizing cyber threats quickly …

A deep learning-based cryptocurrency price prediction scheme for financial institutions

MM Patel, S Tanwar, R Gupta, N Kumar - Journal of information security …, 2020 - Elsevier
A cryptocurrency is a network-based digital exchange medium, where the records are
secured using strong cryptographic algorithms such as Secure Hash Algorithm 2 (SHA-2) …

Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2024 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

Machine learning techniques for spam detection in email and IoT platforms: analysis and research challenges

N Ahmed, R Amin, H Aldabbas… - Security and …, 2022 - Wiley Online Library
Nowaday, emails are used in almost every field, from business to education. Emails have
two subcategories, ie, ham and spam. Email spam, also called junk emails or unwanted …

A vision transformer approach for traffic congestion prediction in urban areas

K Ramana, G Srivastava, MR Kumar… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Traffic problems continue to deteriorate because of increasing population in urban areas
that rely on many modes of transportation, the transportation infrastructure has achieved …

Social media bot detection with deep learning methods: a systematic review

K Hayawi, S Saha, MM Masud, SS Mathew… - Neural Computing and …, 2023 - Springer
Social bots are automated social media accounts governed by software and controlled by
humans at the backend. Some bots have good purposes, such as automatically posting …

Fake profile detection on social networking websites: a comprehensive review

PK Roy, S Chahar - IEEE Transactions on Artificial Intelligence, 2020 - ieeexplore.ieee.org
This article aims to summarize the recent advancement in the fake account detection
methodology on social networking websites. Over the past decade, social networking …

Higher-order structure based anomaly detection on attributed networks

X Yuan, N Zhou, S Yu, H Huang… - … Conference on Big …, 2021 - ieeexplore.ieee.org
Anomaly detection (such as telecom fraud detection and medical image detection) has
attracted the increasing attention of people. The complex interaction between multiple …