Ai-driven cybersecurity: an overview, security intelligence modeling and research directions
Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or
Industry 4.0), which can be used for the protection of Internet-connected systems from cyber …
Industry 4.0), which can be used for the protection of Internet-connected systems from cyber …
Cybersecurity data science: an overview from machine learning perspective
In a computing context, cybersecurity is undergoing massive shifts in technology and its
operations in recent days, and data science is driving the change. Extracting security …
operations in recent days, and data science is driving the change. Extracting security …
A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …
between different communicating devices. The data should be communicated securely …
A survey of network-based intrusion detection data sets
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …
detection systems. This work provides a focused literature survey of data sets for network …
Social engineering attacks: A survey
The advancements in digital communication technology have made communication
between humans more accessible and instant. However, personal and sensitive information …
between humans more accessible and instant. However, personal and sensitive information …
CNN-based network intrusion detection against denial-of-service attacks
As cyberattacks become more intelligent, it is challenging to detect advanced attacks in a
variety of fields including industry, national defense, and healthcare. Traditional intrusion …
variety of fields including industry, national defense, and healthcare. Traditional intrusion …
Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective
IH Sarker - SN Computer Science, 2021 - Springer
Deep learning, which is originated from an artificial neural network (ANN), is one of the
major technologies of today's smart cybersecurity systems or policies to function in an …
major technologies of today's smart cybersecurity systems or policies to function in an …
Survey of fog computing: Fundamental, network applications, and research challenges
Fog computing is an emerging paradigm that extends computation, communication, and
storage facilities toward the edge of a network. Compared to traditional cloud computing, fog …
storage facilities toward the edge of a network. Compared to traditional cloud computing, fog …
Intrusion detection systems for IoT-based smart environments: a survey
One of the goals of smart environments is to improve the quality of human life in terms of
comfort and efficiency. The Internet of Things (IoT) paradigm has recently evolved into a …
comfort and efficiency. The Internet of Things (IoT) paradigm has recently evolved into a …
Security and privacy in fog computing: Challenges
Fog computing paradigm extends the storage, networking, and computing facilities of the
cloud computing toward the edge of the networks while offloading the cloud data centers …
cloud computing toward the edge of the networks while offloading the cloud data centers …