A review on cybersecurity based on machine learning and deep learning algorithms

AF Jahwar, SY Ameen - Journal of Soft Computing and Data …, 2021 - publisher.uthm.edu.my
Machin learning (ML) and Deep Learning (DL) technique have been widely applied to areas
like image processing and speech recognition so far. Likewise, ML and DL plays a critical …

Wsn-bfsf: A new dataset for attacks detection in wireless sensor networks

M Dener, C Okur, S Al, A Orman - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The popularity of wireless sensor networks (WSNs) increases as the usage areas and the
number of integrated systems increase, and this situation attracts the attention of attackers …

[PDF][PDF] IoT-Cloud Assisted Botnet Detection Using Rat Swarm Optimizer with Deep Learning.

SM Alshahrani, FS Alrayes, H Alqahtani… - … , Materials & Continua, 2023 - researchgate.net
Nowadays, Internet of Things (IoT) has penetrated all facets of human life while on the other
hand, IoT devices are heavily prone to cyberattacks. It has become important to develop an …

Development of the information system based on bigdata technology to support endocrinologist-doctors

A Mukasheva, T Iliev, G Balbayev - 2020 7th International …, 2020 - ieeexplore.ieee.org
This paper describes the possibility of developing information system for the support of an
endocrinologists for diagnosis and treatment of diabetes on the basis of tools, such as …

Technique for improvement of backup and restore strategy based on blockchain

S Sokolov, S Vlaev, TB Iliev - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
In this paper a technique is presented for improving backup restoration strategy efficiency by
using efficient backup strategies and blockchain technologies. An overview is provided of …

Artificial intelligence techniques in cybersecurity management

ME Dapel, M Asante, CD Uba, MO Agyeman - Cybersecurity in the Age of …, 2023 - Springer
The rapid development in internet services led to a significant increase in cyberattacks. The
need to secure systems and operations has become apparent as cybersecurity has become …

Mitigating Cyber Anomalies in Virtual Power Plants Using Artificial-Neural-Network-Based Secondary Control with a Federated Learning-Trust Adaptation

SI Taheri, M Davoodi, MH Ali - Energies, 2024 - mdpi.com
Virtual power plants (VPPs) are susceptible to cyber anomalies due to their extensive
communication layer. FL-trust, an improved federated learning (FL) approach, has been …

A survey of using machine learning in IoT security and the challenges faced by researchers

KM Harahsheh, CH Chen - Informatica, 2023 - digitalcommons.odu.edu
Abstract The Internet of Things (IoT) has become more popular in the last 15 years as it has
significantly improved and gained control in multiple fields. We are nowadays surrounded by …

Blockchain security and calculation improvements

I Chenchev - Intelligent Sustainable Systems: Selected Papers of …, 2023 - Springer
Every blockchain block header contains an attribute called Merkle-root. It is the calculated
hash from all included transactions into a particular block. For example, in Bitcoin, the …

Conceptual Foundations of Engineering Restructuring of Manufacturing System in a Cyber-Physical Manufacturing system

M Temelkova - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
The issue of restructuring the real production system into a cyber-physical production system
has not been addressed in scientific developments and research. For this reason, this article …