Reinforcement learning algorithms: A brief survey

AK Shakya, G Pillai, S Chakrabarty - Expert Systems with Applications, 2023 - Elsevier
Reinforcement Learning (RL) is a machine learning (ML) technique to learn sequential
decision-making in complex problems. RL is inspired by trial-and-error based human/animal …

[HTML][HTML] Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends

M Javaid, A Haleem, RP Singh, R Suman - Cyber Security and Applications, 2023 - Elsevier
Healthcare information security is becoming a significant responsibility for all healthcare
organisations and individuals. Innovative medical equipment and healthcare apps are vital …

[HTML][HTML] Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures

ML Hernandez-Jaimes, A Martinez-Cruz… - Internet of Things, 2023 - Elsevier
Recent advances in the Internet of Medical Things (IoMT) have impacted traditional medical
treatment and have evolved data communications in the Smart Healthcare scenario …

Medical image encryption by content-aware DNA computing for secure healthcare

Y Wu, L Zhang, S Berretti, S Wan - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
There exists a rising concern on security of healthcare data and service. Even small lost,
stolen, displaced, hacked, or communicated in personal health data could bring huge …

Federated learning-based misbehavior detection for the 5G-enabled Internet of Vehicles

P Rani, C Sharma, JVN Ramesh… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The concept of federated learning (FL) is becoming increasingly popular as a method for
training collaborative models without loss the sensitive information. The term has become …

Knowledge-driven cybersecurity intelligence: Software vulnerability coexploitation behavior discovery

J Yin, MJ Tang, J Cao, M You, H Wang… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Coexploitation behavior, referring to multiple software vulnerabilities being exploited jointly
by one or more exploits, brings enormous challenges to the prevention and remediation of …

[HTML][HTML] CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT

S Dadkhah, ECP Neto, R Ferreira, RC Molokwu… - Internet of Things, 2024 - Elsevier
Abstract The Internet of Things (IoT) is increasingly integrated into daily life, particularly in
healthcare, through the Internet of Medical Things (IoMT). IoMT devices support services like …

Ransomware detection on linux using machine learning with random forest algorithm

Y Wu, Y Chang - Authorea Preprints, 2024 - techrxiv.org
Ransomware continues to pose a significant threat to cybersecurity, particularly affecting
critical systems running on Linux. The novel application of the random forest algorithm for …

Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection

J Nayak, SK Meher, A Souri, B Naik, S Vimal - The Journal of …, 2022 - Springer
Abstract The Internet of Medical Things (IoMT) is a bionetwork of allied medical devices,
sensors, wearable biosensor devices, etc. It is gradually reforming the healthcare industry by …

ID-RDRL: a deep reinforcement learning-based feature selection intrusion detection model

K Ren, Y Zeng, Z Cao, Y Zhang - Scientific reports, 2022 - nature.com
Network assaults pose significant security concerns to network services; hence, new
technical solutions must be used to enhance the efficacy of intrusion detection systems …