Explainable artificial intelligence applications in cyber security: State-of-the-art in research

Z Zhang, H Al Hamadi, E Damiani, CY Yeun… - IEEE …, 2022 - ieeexplore.ieee.org
This survey presents a comprehensive review of current literature on Explainable Artificial
Intelligence (XAI) methods for cyber security applications. Due to the rapid development of …

A survey on deep learning for cybersecurity: Progress, challenges, and opportunities

M Macas, C Wu, W Fuertes - Computer Networks, 2022 - Elsevier
As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …

Explainable artificial intelligence in cybersecurity: A survey

N Capuano, G Fenza, V Loia, C Stanzione - Ieee Access, 2022 - ieeexplore.ieee.org
Nowadays, Artificial Intelligence (AI) is widely applied in every area of human being's daily
life. Despite the AI benefits, its application suffers from the opacity of complex internal …

Reliable deep learning and IoT-based monitoring system for secure computer numerical control machines against cyber-attacks with experimental verification

MQ Tran, M Elsisi, MK Liu, VQ Vu, K Mahmoud… - IEEE …, 2022 - ieeexplore.ieee.org
This paper introduces a new intelligent integration between an IoT platform and deep
learning neural network (DNN) algorithm for the online monitoring of computer numerical …

A bio-inspired hybrid deep learning model for network intrusion detection

MD Moizuddin, MV Jose - Knowledge-based systems, 2022 - Elsevier
Advances in network communications have resulted in an explosion of connected device
usages in several business domains with phenomenal surge in network traffic. Though the …

Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach

IO Lopes, D Zou, IH Abdulqadder, FA Ruambo… - Computer …, 2022 - Elsevier
The introduction of deep learning techniques in intrusion detection problems has enabled
an enhanced standard of detection effectiveness. However, most of the progress has …

Intrusion detection in wireless sensor network using enhanced empirical based component analysis

L Zhiqiang, G Mohiuddin, Z Jiangbin, M Asim… - Future Generation …, 2022 - Elsevier
Nowadays, several kinds of attacks exist in cyberspace, and hence comprehensive research
has been implemented to overcome these drawbacks. One such method to provide security …

[HTML][HTML] An optimized gradient boost decision tree using enhanced African buffalo optimization method for cyber security intrusion detection

S Mishra - Applied Sciences, 2022 - mdpi.com
The cyber security field has witnessed several intrusion detection systems (IDSs) that are
critical to the detection of malicious activities in network traffic. In the last couple of years …

Network intrusion detection system: a survey on artificial intelligence‐based techniques

MS Habeeb, TR Babu - Expert Systems, 2022 - Wiley Online Library
High data rate requirements in recent years have resulted in the massive expansion of
communication systems, network size and the amount of data generated and processed …

New advancements in cybersecurity: A comprehensive survey

MA Hassan, S Ali, M Imad, S Bibi - Big Data Analytics and Computational …, 2022 - Springer
World is now considered as global village because of interconnected networks. Smart
phones and large computing devices exchange millions of information each day. Information …