[HTML][HTML] A survey of deep learning methods for cyber security

DS Berman, AL Buczak, JS Chavis, CL Corbett - Information, 2019 - mdpi.com
This survey paper describes a literature review of deep learning (DL) methods for cyber
security applications. A short tutorial-style description of each DL method is provided …

Deep reinforcement learning for cyber security

TT Nguyen, VJ Reddi - IEEE Transactions on Neural Networks …, 2021 - ieeexplore.ieee.org
The scale of Internet-connected systems has increased considerably, and these systems are
being exposed to cyberattacks more than ever. The complexity and dynamics of …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Deep learning approach for intelligent intrusion detection system

R Vinayakumar, M Alazab, KP Soman… - Ieee …, 2019 - ieeexplore.ieee.org
Machine learning techniques are being widely used to develop an intrusion detection
system (IDS) for detecting and classifying cyberattacks at the network-level and the host …

Deep learning for anomaly detection: A survey

R Chalapathy, S Chawla - arXiv preprint arXiv:1901.03407, 2019 - arxiv.org
Anomaly detection is an important problem that has been well-studied within diverse
research areas and application domains. The aim of this survey is two-fold, firstly we present …

Machine learning and deep learning methods for cybersecurity

Y Xin, L Kong, Z Liu, Y Chen, Y Li, H Zhu, M Gao… - Ieee …, 2018 - ieeexplore.ieee.org
With the development of the Internet, cyber-attacks are changing rapidly and the cyber
security situation is not optimistic. This survey report describes key literature surveys on …

Intrusion detection for wireless edge networks based on federated learning

Z Chen, N Lv, P Liu, Y Fang, K Chen, W Pan - IEEE Access, 2020 - ieeexplore.ieee.org
Edge computing provides off-load computing and application services close to end-users,
greatly reducing cloud pressure and communication overhead. However, wireless edge …

A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems

D Gümüşbaş, T Yıldırım, A Genovese… - IEEE Systems …, 2020 - ieeexplore.ieee.org
This survey presents a comprehensive overview of machine learning methods for
cybersecurity intrusion detection systems, with a specific focus on recent approaches based …

Network attacks detection methods based on deep learning techniques: a survey

Y Wu, D Wei, J Feng - Security and Communication Networks, 2020 - Wiley Online Library
With the development of the fifth‐generation networks and artificial intelligence
technologies, new threats and challenges have emerged to wireless communication system …

Automated crowdturfing attacks and defenses in online review systems

Y Yao, B Viswanath, J Cryan, H Zheng… - Proceedings of the 2017 …, 2017 - dl.acm.org
Malicious crowdsourcing forums are gaining traction as sources of spreading misinformation
online, but are limited by the costs of hiring and managing human workers. In this paper, we …