[HTML][HTML] Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends

MM Belal, DM Sundaram - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, machine learning and deep learning algorithms are used in recent studies as
active security techniques instead of traditional ones to secure the cloud environment based …

[HTML][HTML] IoT malware detection architecture using a novel channel boosted and squeezed CNN

M Asam, SH Khan, A Akbar, S Bibi, T Jamal, A Khan… - Scientific Reports, 2022 - nature.com
Interaction between devices, people, and the Internet has given birth to a new digital
communication model, the internet of things (IoT). The integration of smart devices to …

Android malware detection based on multi-head squeeze-and-excitation residual network

H Zhu, W Gu, L Wang, Z Xu, VS Sheng - Expert Systems with Applications, 2023 - Elsevier
The popularity and flexibility of the Android platform makes it the primary target of malicious
attackers. The behaviors of malware, such as malicious charges and privacy theft, pose …

The purpose of cybersecurity governance in the digital transformation of public services and protecting the digital environment

M Mijwil, Y Filali, M Aljanabi, M Bounabi… - Mesopotamian …, 2023 - mesopotamian.press
As it tries to incorporate computer-based technology into the public services provided by
businesses or organisations, the digital transformation process is currently regarded one of …

[HTML][HTML] False alert detection based on deep learning and machine learning

S Li, D Qin, X Wu, J Li, B Li, W Han - International Journal on …, 2022 - igi-global.com
Among the large number of network attack alerts generated every day, actual security
incidents are usually overwhelmed by a large number of redundant alerts. Therefore, how to …

[HTML][HTML] Attribution classification method of APT malware in IoT using machine learning techniques

S Li, Q Zhang, X Wu, W Han, Z Tian - Security and Communication …, 2021 - hindawi.com
In recent years, the popularity of IoT (Internet of Things) applications and services has
brought great convenience to people's lives, but ubiquitous IoT has also brought many …

DroidEncoder: Malware detection using auto-encoder based feature extractor and machine learning algorithms

H Bakır, R Bakır - Computers and Electrical Engineering, 2023 - Elsevier
Android Malware detection became a hot topic over the last several years. Although
considerable studies have been conducted utilizing machine learning-based methods, little …

Path-based multi-sources localization in multiplex networks

L Cheng, X Li, Z Han, T Luo, L Ma, P Zhu - Chaos, Solitons & Fractals, 2022 - Elsevier
With the prosperity of modern technology, propagation phenomena of diverse information
become universal nowadays. Nevertheless, spreading of malicious information will …

Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses

AA Elkhail, RUD Refat, R Habre, A Hafeez… - IEEE …, 2021 - ieeexplore.ieee.org
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …

Application of artificial intelligence to network forensics: Survey, challenges and future directions

S Rizvi, M Scanlon, J Mcgibney, J Sheppard - Ieee Access, 2022 - ieeexplore.ieee.org
Network forensics focuses on the identification and investigation of internal and external
network attacks, the reverse engineering of network protocols, and the uninstrumented …