Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions

IH Sarker, AI Khan, YB Abushark, F Alsolami - Mobile Networks and …, 2023 - Springer
Abstract The Internet of Things (IoT) is one of the most widely used technologies today, and
it has a significant effect on our lives in a variety of ways, including social, commercial, and …

Ai-driven cybersecurity: an overview, security intelligence modeling and research directions

IH Sarker, MH Furhad, R Nowrozy - SN Computer Science, 2021 - Springer
Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or
Industry 4.0), which can be used for the protection of Internet-connected systems from cyber …

Explainable artificial intelligence in cybersecurity: A survey

N Capuano, G Fenza, V Loia, C Stanzione - Ieee Access, 2022 - ieeexplore.ieee.org
Nowadays, Artificial Intelligence (AI) is widely applied in every area of human being's daily
life. Despite the AI benefits, its application suffers from the opacity of complex internal …

Cybersecurity data science: an overview from machine learning perspective

IH Sarker, ASM Kayes, S Badsha, H Alqahtani… - Journal of Big …, 2020 - Springer
In a computing context, cybersecurity is undergoing massive shifts in technology and its
operations in recent days, and data science is driving the change. Extracting security …

Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective

IH Sarker - SN Computer Science, 2021 - Springer
Deep learning, which is originated from an artificial neural network (ANN), is one of the
major technologies of today's smart cybersecurity systems or policies to function in an …

Robust deep learning early alarm prediction model based on the behavioural smell for android malware

E Amer, S El-Sappagh - Computers & Security, 2022 - Elsevier
Due to the widespread expansion of the Android malware industry, malicious Android
processes mining became a necessity to understand their behavior. Nevertheless, due to …

Constructing features for detecting android malicious applications: issues, taxonomy and directions

W Wang, M Zhao, Z Gao, G Xu, H **an, Y Li… - IEEE …, 2019 - ieeexplore.ieee.org
The number of applications (apps) available for smart devices or Android based IoT (Internet
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …

Malicious application detection in android—a systematic literature review

T Sharma, D Rattan - Computer Science Review, 2021 - Elsevier
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …

Advanced Persistent Threat intelligent profiling technique: A survey

BH Tang, JF Wang, Z Yu, B Chen, W Ge, J Yu… - Computers and Electrical …, 2022 - Elsevier
With the boom in Internet and information technology, cyber-attacks are becoming more
frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike …

Cyber attacks in cyber-physical microgrid systems: A comprehensive review

S Suprabhath Koduru, VSP Machina, S Madichetty - Energies, 2023 - mdpi.com
The importance of and need for cyber security have increased in the last decade. The critical
infrastructure of the country, modeled with cyber-physical systems (CPS), is becoming …