[HTML][HTML] Machine learning-based botnet detection in software-defined network: a systematic review

K Shinan, K Alsubhi, A Alzahrani, MU Ashraf - Symmetry, 2021 - mdpi.com
In recent decades, the internet has grown and changed the world tremendously, and this, in
turn, has brought about many cyberattacks. Cybersecurity represents one of the most …

[HTML][HTML] A novel LSTM–CNN–grid search-based deep neural network for sentiment analysis

I Priyadarshini, C Cotton - The Journal of Supercomputing, 2021 - Springer
As the number of users getting acquainted with the Internet is escalating rapidly, there is
more user-generated content on the web. Comprehending hidden opinions, sentiments, and …

A machine-learning-based technique for false data injection attacks detection in industrial IoT

MMN Aboelwafa, KG Seddik… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The accelerated move toward the adoption of the Industrial Internet-of-Things (IIoT)
paradigm has resulted in numerous shortcomings as far as security is concerned. One of the …

[HTML][HTML] Botnet attack detection using local global best bat algorithm for industrial internet of things

A Alharbi, W Alosaimi, H Alyami, HT Rauf… - Electronics, 2021 - mdpi.com
The need for timely identification of Distributed Denial-of-Service (DDoS) attacks in the
Internet of Things (IoT) has become critical in minimizing security risks as the number of IoT …

Security threats, defense mechanisms, challenges, and future directions in cloud computing

S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G
Internet need services offered by cloud computing for processing and storing more …

Identifying cyber insecurities in trustworthy space and energy sector for smart grids

I Priyadarshini, R Kumar, R Sharma, PK Singh… - Computers & Electrical …, 2021 - Elsevier
Energy is critical infrastructure, and addressing cybersecurity issues in the energy sector is
challenging. Cloud computing has advanced from being a data storage solution to a …

Artificial intelligence‐powered decentralized framework for Internet of Things in Healthcare 4.0

V Puri, A Kataria, V Sharma - Transactions on Emerging …, 2024 - Wiley Online Library
Remote patient monitoring and data management have gained much popularity in recent
years because of their enhanced access to low‐cost healthcare services. A cloud‐based …

Phishing attacks detection using machine learning approach

MN Alam, D Sarma, FF Lima, I Saha… - … conference on smart …, 2020 - ieeexplore.ieee.org
Evolving digital transformation has exacerbated cybersecurity threats globally. Digitization
expands the doors wider to cybercriminals. Initially cyberthreats approach in the form of …

[PDF][PDF] DoS and DDoS attack detection using deep learning and IDS

M Shurman, R Khrais, A Yateem - Int. Arab J. Inf. Technol, 2020 - researchgate.net
In the recent years, Denial-of-Dervice (DoS) orDistributed Denial-of-Service (DDoS) attack
has spread greatly and attackers make online systems unavailable to legitimate users by …

On detecting and classifying DGA botnets and their families

TA Tuan, HV Long, D Taniar - Computers & Security, 2022 - Elsevier
Botnets are a frequent threat to information systems on the Internet, capable of launching
denial-of-service attacks, spreading spam and malware on a large scale. Detecting and …