Deep learning: Systematic review, models, challenges, and research directions
T Talaei Khoei, H Ould Slimane… - Neural Computing and …, 2023 - Springer
The current development in deep learning is witnessing an exponential transition into
automation applications. This automation transition can provide a promising framework for …
automation applications. This automation transition can provide a promising framework for …
Application of deep reinforcement learning to intrusion detection for supervised problems
The application of new techniques to increase the performance of intrusion detection
systems is crucial in modern data networks with a growing threat of cyber-attacks. These …
systems is crucial in modern data networks with a growing threat of cyber-attacks. These …
Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics in …
Multiple governmental agencies and private organisations have made commitments for the
colonisation of Mars. Such colonisation requires complex systems and infrastructure that …
colonisation of Mars. Such colonisation requires complex systems and infrastructure that …
Artificial intelligence algorithms for cyberspace security applications: a technological and status review
J Chen, D Wu, R **e - Frontiers of Information Technology & Electronic …, 2023 - Springer
Three technical problems should be solved urgently in cyberspace security: the timeliness
and accuracy of network attack detection, the credibility assessment and prediction of the …
and accuracy of network attack detection, the credibility assessment and prediction of the …
An optimized LSTM-based deep learning model for anomaly network intrusion detection
The increasing prevalence of network connections is driving a continuous surge in the
requirement for network security and safeguarding against cyberattacks. This has triggered …
requirement for network security and safeguarding against cyberattacks. This has triggered …
Yapay Zekâ Odaklı Siber Risk ve Güvenlik Yönetimi
A Efe - Uluslararası Yönetim Bilişim Sistemleri ve Bilgisayar …, 2021 - dergipark.org.tr
Yapay zekayı (YZ) ve makine öğrenimini siber güvenlik için silahlandırmak hala erken
aşamalarda olsa da büyük ölçekli firmalar ve kuruluşlar, güvenlik sistemlerini ve …
aşamalarda olsa da büyük ölçekli firmalar ve kuruluşlar, güvenlik sistemlerini ve …
SRFE: a stepwise recursive feature elimination approach for network intrusion detection systems
Network intrusion detection systems (NIDSs) have evolved into a significant subject in
cybersecurity research, mainly due to the growth of cyberattacks and intelligence, which also …
cybersecurity research, mainly due to the growth of cyberattacks and intelligence, which also …
Implementation of a novel secured authentication protocol for cyber security applications
V Suresh Kumar, O Ibrahim Khalaf… - Scientific Reports, 2024 - nature.com
Robust verification protocols are crucial for maintaining the security and reliability of
sensitive information due to the increasing complexity of cyber-attacks. This paper …
sensitive information due to the increasing complexity of cyber-attacks. This paper …
Hybrid quantum enhanced federated learning for cyber attack detection
G Subramanian, M Chinnadurai - Scientific Reports, 2024 - nature.com
Cyber-attack brings significant threat and become a critical issue in the digital world network
security. The conventional procedures developed to detects are centralized and often …
security. The conventional procedures developed to detects are centralized and often …
Artificial neural networks training acceleration through network science strategies
The development of deep learning has led to a dramatic increase in the number of
applications of artificial intelligence. However, the training of deeper neural networks for …
applications of artificial intelligence. However, the training of deeper neural networks for …