Deep learning: Systematic review, models, challenges, and research directions

T Talaei Khoei, H Ould Slimane… - Neural Computing and …, 2023 - Springer
The current development in deep learning is witnessing an exponential transition into
automation applications. This automation transition can provide a promising framework for …

Application of deep reinforcement learning to intrusion detection for supervised problems

M Lopez-Martin, B Carro… - Expert Systems with …, 2020 - Elsevier
The application of new techniques to increase the performance of intrusion detection
systems is crucial in modern data networks with a growing threat of cyber-attacks. These …

Artificial intelligence algorithms for cyberspace security applications: a technological and status review

J Chen, D Wu, R **e - Frontiers of Information Technology & Electronic …, 2023 - Springer
Three technical problems should be solved urgently in cyberspace security: the timeliness
and accuracy of network attack detection, the credibility assessment and prediction of the …

An optimized LSTM-based deep learning model for anomaly network intrusion detection

N Dash, S Chakravarty, AK Rath, NC Giri… - Scientific Reports, 2025 - nature.com
The increasing prevalence of network connections is driving a continuous surge in the
requirement for network security and safeguarding against cyberattacks. This has triggered …

Yapay Zekâ Odaklı Siber Risk ve Güvenlik Yönetimi

A Efe - Uluslararası Yönetim Bilişim Sistemleri ve Bilgisayar …, 2021 - dergipark.org.tr
Yapay zekayı (YZ) ve makine öğrenimini siber güvenlik için silahlandırmak hala erken
aşamalarda olsa da büyük ölçekli firmalar ve kuruluşlar, güvenlik sistemlerini ve …

SRFE: a stepwise recursive feature elimination approach for network intrusion detection systems

AA Qasem, MH Qutqut, F Alhaj, A Kitana - Peer-to-Peer Networking and …, 2024 - Springer
Network intrusion detection systems (NIDSs) have evolved into a significant subject in
cybersecurity research, mainly due to the growth of cyberattacks and intelligence, which also …

Implementation of a novel secured authentication protocol for cyber security applications

V Suresh Kumar, O Ibrahim Khalaf… - Scientific Reports, 2024 - nature.com
Robust verification protocols are crucial for maintaining the security and reliability of
sensitive information due to the increasing complexity of cyber-attacks. This paper …

Hybrid quantum enhanced federated learning for cyber attack detection

G Subramanian, M Chinnadurai - Scientific Reports, 2024 - nature.com
Cyber-attack brings significant threat and become a critical issue in the digital world network
security. The conventional procedures developed to detects are centralized and often …

Artificial neural networks training acceleration through network science strategies

L Cavallaro, O Bagdasar, P De Meo, G Fiumara… - Soft Computing, 2020 - Springer
The development of deep learning has led to a dramatic increase in the number of
applications of artificial intelligence. However, the training of deeper neural networks for …