Intelligent behavior-based malware detection system on cloud computing environment

Ö Aslan, M Ozkan-Okay, D Gupta - IEEE Access, 2021 - ieeexplore.ieee.org
These days, cloud computing is one of the most promising technologies to store information
and provide services online efficiently. Using this rapidly developing technology to protect …

An efficient spam detection technique for IoT devices using machine learning

A Makkar, S Garg, N Kumar, MS Hossain… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a group of millions of devices having sensors and actuators
linked over wired or wireless channel for data transmission. IoT has grown rapidly over the …

[HTML][HTML] Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …

A cross-layer defense scheme for edge intelligence-enabled CBTC systems against MitM attacks

Y Li, L Zhu, H Wang, FR Yu, S Liu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
While communication-based train control (CBTC) systems play a crucial role in the efficient
and reliable operation of urban rail transits, its high penetration level of communication …

DroidEncoder: Malware detection using auto-encoder based feature extractor and machine learning algorithms

H Bakır, R Bakır - Computers and Electrical Engineering, 2023 - Elsevier
Android Malware detection became a hot topic over the last several years. Although
considerable studies have been conducted utilizing machine learning-based methods, little …

Edge learning: The enabling technology for distributed big data analytics in the edge

J Zhang, Z Qu, C Chen, H Wang, Y Zhan, B Ye… - ACM Computing …, 2021 - dl.acm.org
Machine Learning (ML) has demonstrated great promise in various fields, eg, self-driving,
smart city, which are fundamentally altering the way individuals and organizations live, work …

Cyber-security and reinforcement learning—A brief survey

AMK Adawadkar, N Kulkarni - Engineering Applications of Artificial …, 2022 - Elsevier
This paper presents a comprehensive literature review on Reinforcement Learning (RL)
techniques used in Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) …

A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud

J Liu, X Wang, S Shen, G Yue, S Yu… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
To enhance dependable resource allocation against increasing distributed denial-of-service
(DDoS) attacks, in this article, we investigate interactions between a sensor device-edgeVM …

Multistage signaling game-based optimal detection strategies for suppressing malware diffusion in fog-cloud-based IoT networks

S Shen, L Huang, H Zhou, S Yu… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
We consider the Internet of Things (IoT) with malware diffusion and seek optimal malware
detection strategies for preserving the privacy of smart objects in IoT networks and …

Gradient shielding: towards understanding vulnerability of deep neural networks

Z Gu, W Hu, C Zhang, H Lu, L Yin… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Deep neural networks (DNNs) have been widely adopted but they are vulnerable to
intentionally crafted adversarial examples. Various attack methods against DNNs have been …