Big data architecture for network security

B Bansal, VN Jenipher, R Jain, R Dilip… - Cyber Security and …, 2022 - Wiley Online Library
Research is considering security of big data and retaining the performance during its
transmission over network. It has been observed that there have been several researches …

BigRC-EML: big-data based ransomware classification using ensemble machine learning

S Aurangzeb, H Anwar, MA Naeem, M Aleem - Cluster Computing, 2022 - Springer
Ransomware is a subcategory of malware whose specific goal is to hold the victim's data by
using encryption techniques until a ransom is paid. With mainstream usage of the Windows …

Malbertv2: Code aware bert-based model for malware identification

A Rahali, MA Akhloufi - Big Data and Cognitive Computing, 2023 - mdpi.com
To proactively mitigate malware threats, cybersecurity tools, such as anti-virus and anti-
malware software, as well as firewalls, require frequent updates and proactive …

Rallying adversarial techniques against deep learning for network security

J Clements, Y Yang, AA Sharma… - 2021 IEEE symposium …, 2021 - ieeexplore.ieee.org
Recent advances in artificial intelligence and the increasing need for robust defensive
measures in network security have led to the adoption of deep learning approaches for …

A systematic review on heart disease prediction using deep neural network for scalable datasets

S Suvanov, M Sabharwal… - … , Computing and Security …, 2023 - taylorfrancis.com
Deep Learning and Artificial Neural Networks (ANN) are technologies that simulate a human
brain because it consists of several neurons. The input layer, hidden layers, and output layer …

Key pillars for FinTech and cybersecurity

MC Șcheau, CM Rangu, FV Popescu… - Acta Universitatis …, 2022 - ceeol.com
The technological advancements of the last couple of years combined with the unique
situation created by the Covid-19 pandemic made the customer more open to the …

Detection of zero‐day attacks in computer networks using combined classification

H Gavari Bami, E Moharamkhani… - Concurrency and …, 2022 - Wiley Online Library
In today's world, many public and private services are provided virtually on the Internet. Due
to the increasing dynamism and development of computer networks, intrusion detection …

Machine learning and network traffic to distinguish between malware and benign applications

L Abualigah, S Abualigah, M Almahmoud… - … Intelligence on Web and …, 2022 - Springer
Virus detection software is widely used for servers, systems, and devices that seek to
maintain security and reliability. Although these programs provide an excellent safety level …

[PDF][PDF] Youtube trending video metadata analysis using machine learning

S Amudha, VR Niveditha, PSR Kumar, M Revathi… - Research …, 2020 - researchgate.net
Abstract Data Analysis and Mining are becoming indispensable part of every major
organization to find recent trends and statistics and formulate business strategies, planning …

[PDF][PDF] Development of Advanced IoT Devices using ECC-LSTM for an Enhanced Device Security

RA Devi, A Arunachalam… - International Journal of …, 2020 - researchgate.net
Nowadays, the evolve of unknown attacks have been prevented with an advancement of
cyber security whereas there are several applications like smart cities and smart industries …