Deep reinforcement learning for cyber security

TT Nguyen, VJ Reddi - IEEE Transactions on Neural Networks …, 2021 - ieeexplore.ieee.org
The scale of Internet-connected systems has increased considerably, and these systems are
being exposed to cyberattacks more than ever. The complexity and dynamics of …

An overview of security and privacy in smart cities' IoT communications

F Al‐Turjman, H Zahmatkesh… - Transactions on …, 2022 - Wiley Online Library
Smart cities have brought significant improvements in quality of life and services to citizens
and urban environments. They are fully enabled to control the physical objects in real time …

Machine learning algorithms for wireless sensor networks: A survey

DP Kumar, T Amgoth, CSR Annavarapu - Information Fusion, 2019 - Elsevier
Wireless sensor network (WSN) is one of the most promising technologies for some real-
time applications because of its size, cost-effective and easily deployable nature. Due to …

A survey on attack detection, estimation and control of industrial cyber–physical systems

D Zhang, QG Wang, G Feng, Y Shi, AV Vasilakos - ISA transactions, 2021 - Elsevier
Cyber–physical systems (CPSs) are complex systems that involve technologies such as
control, communication, and computing. Nowadays, CPSs have a wide range of applications …

Security and privacy in smart cities: Challenges and opportunities

L Cui, G Xie, Y Qu, L Gao, Y Yang - IEEE access, 2018 - ieeexplore.ieee.org
Smart cities are expected to improve the quality of daily life, promote sustainable
development, and improve the functionality of urban systems. Now that many smart systems …

A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection

V Hajisalem, S Babaie - Computer Networks, 2018 - Elsevier
Due to the widespread use of the internet, computer systems are prone to information theft
that has led to the emergence of Intrusion Detection Systems (IDSs). Various approaches …

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing

O Osanaiye, H Cai, KKR Choo… - EURASIP Journal on …, 2016 - Springer
Widespread adoption of cloud computing has increased the attractiveness of such services
to cybercriminals. Distributed denial of service (DDoS) attacks targeting the cloud's …

Evaluation of machine learning classifiers for mobile malware detection

FA Narudin, A Feizollah, NB Anuar, A Gani - Soft Computing, 2016 - Springer
Mobile devices have become a significant part of people's lives, leading to an increasing
number of users involved with such technology. The rising number of users invites hackers …

HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare

S Saif, P Das, S Biswas, M Khari… - Microprocessors and …, 2022 - Elsevier
This paper presents machine learning and metaheuristic algorithms based hybrid intelligent
Intrusion Detection System (HIIDS) for Internet of Things based applications such as …

A game theory approach for cooperative control to improve data quality and false data detection in WSN

R Casado‐Vara, F Prieto‐Castrillo… - … Journal of Robust …, 2018 - Wiley Online Library
New solutions are required for the management of heterogeneous distributed sensor
networks in order to address the problem of data quality and false data detection in wireless …