[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

DroidRL: Feature selection for android malware detection with reinforcement learning

Y Wu, M Li, Q Zeng, T Yang, J Wang, Z Fang… - Computers & …, 2023 - Elsevier
Due to the completely open-source nature of Android, the exploitable vulnerability of
malware attacks is increasing. Machine learning, leading to a great evolution in Android …

DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks

W Ding, M Abdel-Basset, R Mohamed - Information Sciences, 2023 - Elsevier
Our daily lives have been profoundly changed over the past few years owing to the growing
presence of the Internet of Things (IoT). Importantly, IoT makes our lives more convenient …

[HTML][HTML] Joint optimization of UAV-IRS placement and resource allocation for wireless powered mobile edge computing networks

M Ahmed, HM Alshahrani, N Alruwais, MM Asiri… - Journal of King Saud …, 2023 - Elsevier
The rapid evolution of communication systems towards the next generation has led to an
increased deployment of Internet of Things (IoT) devices for various real-time applications …

A dynamic robust DL-based model for android malware detection

IU Haq, TA Khan, A Akhunzada - IEEE Access, 2021 - ieeexplore.ieee.org
The dramatic increase in Android-based smart devices has brought technological revolution
to improve the overall quality of life and thus making it worth a billion-dollar market. Despite …

Toward trustworthy human suspicious activity detection from surveillance videos using deep learning

AM Buttar, M Bano, MA Akbar, A Alabrah, AH Gumaei - Soft Computing, 2023 - Springer
In today's world, suspicious or unusual activities express threats and danger to others. For
the prevention of various security issues, an automatic video detection system is very …

A hybrid DL-based detection mechanism for cyber threats in secure networks

S Qureshi, J He, S Tunio, N Zhu, F Akhtar, F Ullah… - Ieee …, 2021 - ieeexplore.ieee.org
The astonishing growth of sophisticated ever-evolving cyber threats and attacks throws the
entire Internet-of-Things (IoT) infrastructure into chaos. As the IoT belongs to the …

Secure IIoT-enabled industry 4.0

Z Hussain, A Akhunzada, J Iqbal, I Bibi, A Gani - Sustainability, 2021 - mdpi.com
The Industrial Internet of things (IIoT) is the main driving force behind smart manufacturing,
industrial automation, and industry 4.0. Conversely, industrial IoT as the evolving …

Deep AI-powered cyber threat analysis in IIoT

I Bibi, A Akhunzada, N Kumar - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Distributed Industrial Internet of Things (IIoT) has entirely revolutionized the industrial sector
that varies from autonomous industrial processes to automation of processes without human …

[PDF][PDF] Enhancеd Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis

MT Jafar, M Al-Fawa'reh, M Barhoush… - Cybernetics and …, 2022 - intapi.sciendo.com
Public health responses to the COVID-19 pandemic since March 2020 have led to
lockdowns and social distancing in most countries around the world, with a shift from the …