AMDDLmodel: Android smartphones malware detection using deep learning model

M Aamir, MW Iqbal, M Nosheen, MU Ashraf, A Shaf… - Plos one, 2024 - journals.plos.org
Android is the most popular operating system of the latest mobile smart devices. With this
operating system, many Android applications have been developed and become an …

Multi-source refined adversarial domain adaptation with transfer complementarity infusion for IoT intrusion detection under limited samples

K Li, W Ma, H Duan, H Xie - Expert Systems with Applications, 2024 - Elsevier
The arrival of 5G has facilitated further development of the Internet of Things (IoT) which is
vulnerable to hacking because of its widespread use. Large networks oriented toward …

An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications

U Rani, S Kumar, N Dahiya, K Solanki… - Journal of Cloud …, 2024 - Springer
Bitcoin exchange security is crucial because of MEC's widespread use. Cryptojacking has
compromised MEC app security and bitcoin exchange ecosystem functionality. This paper …

[HTML][HTML] Artificial Intelligence-based intrusion detection system for V2V communication in vehicular adhoc networks

A Khalil, H Farman, MM Nasralla, B Jan… - Ain Shams Engineering …, 2024 - Elsevier
Abstract Vehicular Adhoc Networks (VANETs) enable vehicle-infrastructure communication,
enhancing Intelligent Transportation Systems (ITS). Vehicles interconnect wirelessly to …

Enhancing the Efficiency of a Cybersecurity Operations Center Using Biomimetic Algorithms Empowered by Deep Q-Learning

R Olivares, O Salinas, C Ravelo, R Soto, B Crawford - Biomimetics, 2024 - mdpi.com
In the complex and dynamic landscape of cyber threats, organizations require sophisticated
strategies for managing Cybersecurity Operations Centers and deploying Security …

DL-ADS: Improved Grey Wolf Optimization Enabled AE-LSTM Technique for Efficient Network Anomaly Detection in Internet of Thing Edge computing

J Manokaran, G Vairavel - IEEE Access, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) technology has begun to proliferate in recent years, which
simultaneously increases the number of attacks. Owing to the massive volume and multi …

Enhancing the Efficiency of a Cyber SOC Using Biomimetic Algorithms Empowered by Deep Q–Learning

R Olivares, O Salinas, C Ravelo, R Soto, B Crawford - 2024 - preprints.org
Given the landscape of intricate and constantly evolving cyber threats, organizations
demand refined strategies to deploy a Security Information and Event Management to …

Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks

S Atiewi, A Al-Rahayfeh, M Almiani, A Abuhussein… - Cluster …, 2023 - Springer
With the rapid advancement of technology, smart home environments have become
increasingly popular, offering convenience and automation to homeowners. However, as …

Enhancing intrusion detection using coati optimization algorithm with deep learning on vehicular Adhoc networks

K Sarathkumar, P Sudhakar, AC Kanmani - International Journal of …, 2024 - Springer
Vehicular ad hoc networks (VANETs) role a vital play in allowing technology for future
cooperative intelligent transportation systems (CITSs). Vehicles in VANETs transmit real …

Evaluating the Performance of Long Short-Term Memory for Web Attack Detection

SA Momu, RR Siddiqui, MS Hoque… - … on Computer and …, 2023 - ieeexplore.ieee.org
Web threats provide a continuing and dynamic hazard to both individuals and organizations,
encompassing a wide spectrum of malicious activities such as SQL injections and denial-of …