A comprehensive survey on deep learning based malware detection techniques

M Gopinath, SC Sethuraman - Computer Science Review, 2023‏ - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

A Khraisat, A Alazab - Cybersecurity, 2021‏ - Springer
Abstract The Internet of Things (IoT) has been rapidly evolving towards making a greater
impact on everyday life to large industrial systems. Unfortunately, this has attracted the …

A survey on blockchain for big data: Approaches, opportunities, and future directions

N Deepa, QV Pham, DC Nguyen… - Future Generation …, 2022‏ - Elsevier
Big data has generated strong interest in various scientific and engineering domains over
the last few years. Despite many advantages and applications, there are many challenges in …

Unmanned aerial vehicles in smart agriculture: Applications, requirements, and challenges

PKR Maddikunta, S Hakak, M Alazab… - IEEE sensors …, 2021‏ - ieeexplore.ieee.org
In the next few years, smart farming will reach each and every nook of the world. The
prospects of using unmanned aerial vehicles (UAV) for smart farming are immense …

Anomaly-based intrusion detection system for IoT application

M Bhavsar, K Roy, J Kelly, O Olusola - Discover Internet of things, 2023‏ - Springer
Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it
has a wide application, such as in transportation, military, healthcare, agriculture, and many …

CANintelliIDS: Detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU

AR Javed, S Ur Rehman, MU Khan… - IEEE transactions on …, 2021‏ - ieeexplore.ieee.org
Controller area network (CAN) is a communication protocol that provides reliable and
productive transmission between in-vehicle nodes continuously. CAN bus protocol is …

Deep learning approach for intelligent intrusion detection system

R Vinayakumar, M Alazab, KP Soman… - IEEE …, 2019‏ - ieeexplore.ieee.org
Machine learning techniques are being widely used to develop an intrusion detection
system (IDS) for detecting and classifying cyberattacks at the network-level and the host …

Privacy-preserving blockchain-based federated learning for traffic flow prediction

Y Qi, MS Hossain, J Nie, X Li - Future Generation Computer Systems, 2021‏ - Elsevier
As accurate and timely traffic flow information is extremely important for traffic management,
traffic flow prediction has become a vital component of intelligent transportation systems …

Machine intelligence and medical cyber-physical system architectures for smart healthcare: Taxonomy, challenges, opportunities, and possible solutions

TA Shaikh, T Rasool, P Verma - Artificial Intelligence in Medicine, 2023‏ - Elsevier
Hospitals use medical cyber-physical systems (MCPS) more often to give patients quality
continuous care. MCPS isa life-critical, context-aware, networked system of medical …

Robust intelligent malware detection using deep learning

R Vinayakumar, M Alazab, KP Soman… - IEEE …, 2019‏ - ieeexplore.ieee.org
Security breaches due to attacks by malicious software (malware) continue to escalate
posing a major security concern in this digital age. With many computer users, corporations …