A survey of deep learning methods for cyber security

DS Berman, AL Buczak, JS Chavis, CL Corbett - Information, 2019 - mdpi.com
This survey paper describes a literature review of deep learning (DL) methods for cyber
security applications. A short tutorial-style description of each DL method is provided …

Deep learning in diverse intelligent sensor based systems

Y Zhu, M Wang, X Yin, J Zhang, E Meijering, J Hu - Sensors, 2022 - mdpi.com
Deep learning has become a predominant method for solving data analysis problems in
virtually all fields of science and engineering. The increasing complexity and the large …

Lanobert: System log anomaly detection based on bert masked language model

Y Lee, J Kim, P Kang - Applied Soft Computing, 2023 - Elsevier
The system log generated in a computer system refers to large-scale data that are collected
simultaneously and used as the basic data for determining errors, intrusion and abnormal …

Machine‐learning approach to optimize smote ratio in class imbalance dataset for intrusion detection

JH Seo, YH Kim - Computational intelligence and …, 2018 - Wiley Online Library
The KDD CUP 1999 intrusion detection dataset was introduced at the third international
knowledge discovery and data mining tools competition, and it has been widely used for …

Artificial neural network for cybersecurity: A comprehensive review

P Podder, S Bharati, M Mondal, PK Paul… - arXiv preprint arXiv …, 2021 - arxiv.org
Cybersecurity is a very emerging field that protects systems, networks, and data from digital
attacks. With the increase in the scale of the Internet and the evolution of cyber attacks …

A novel method using LSTM-RNN to generate smart contracts code templates for improved usability

Z Hao, B Zhang, D Mao, J Yen, Z Zhao, M Zuo… - Multimedia Tools and …, 2023 - Springer
Recently, the development of blockchain technology has given us an opportunity to improve
the security and trustworthiness of multimedia. With the applications of blockchain …

A new method of fuzzy support vector machine algorithm for intrusion detection

W Liu, LL Ci, LP Liu - Applied Sciences, 2020 - mdpi.com
Since SVM is sensitive to noises and outliers of system call sequence data. A new fuzzy
support vector machine algorithm based on SVDD is presented in this paper. In our …

Evaluating word embedding feature extraction techniques for host-based intrusion detection systems

PK Mvula, P Branco, GV Jourdan, HL Viktor - Discover Data, 2023 - Springer
Abstract Research into Intrusion and Anomaly Detectors at the Host level typically pays
much attention to extracting attributes from system call traces. These include window-based …

Attentional payload anomaly detector for web applications

ZQ Qin, XK Ma, YJ Wang - … 2018, Siem Reap, Cambodia, December 13-16 …, 2018 - Springer
Nowadays web applications influence people deeply and become popular targets of
attackers. The payload anomaly detection is an effective method to keep the security of web …

Dynamic Malware Classification and API Categorisation of Windows Portable Executable Files Using Machine Learning

DZ Syeda, MN Asghar - Applied Sciences, 2024 - mdpi.com
The rise of malware attacks presents a significant cyber-security challenge, with advanced
techniques and offline command-and-control (C2) servers causing disruptions and financial …