A comprehensive survey on deep learning based malware detection techniques

M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …

[HTML][HTML] SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data

DK Talapula, KK Ravulakollu, M Kumar… - Artificial Intelligence …, 2023 - Springer
Advancements in cloud technologies have increased the infrastructural needs of data
centers due to storage needs and processing of extensive dimensional data. Many service …

Cyber Security Threat Detection in Internet of Things Using Optimized Deep Learning Technique

U Mariappan, D Balakrishnan… - 2023 3rd Asian …, 2023 - ieeexplore.ieee.org
Cybersecurity threat detection in the Internet of Things (IoT) refers to the process of
identifying and addressing potential security risks and attacks within IoT systems and …

Securing cloud-based medical data: an optimal dual kernal support vector approach for enhanced EHR management

MLS Kokila, E Fenil, NP Ponnuviji… - International Journal of …, 2024 - Springer
Cloud computing is one of the advanced technologies to process rapidly growing data. At
the same instant, the necessity of storage space for the voluminous digital medical data has …

A Hybrid Meta-heuristics Algorithm: XGBoost-Based Approach for IDS in IoT

S Bajpai, K Sharma, BK Chaurasia - SN Computer Science, 2024 - Springer
In recent years, the importance of the Internet of Things (IoT) and its applications has
increased. IoT networks are diverse, allowing for various real-time applications and making …

IoT-Driven Analytics and Edge Intelligence in Autonomous Navigation Systems

W Nwankwo, J Orukwo, C Umezuruike… - IoT Edge …, 2024 - Springer
Abstract The Internet of Things (IoT) has continued to evolve as a highly disruptive
technology by enabling smart connectivity beyond the realm of traditional computing …

Landscape View of Hyperparameter Optimization Cybersecurity by Using Bio-Inspired Algorithm

ZZ Jundi - International Conference on Intelligence Science, 2023 - Springer
Technological advancement has increased dramatically in recent years, giving rise to a
range of new ideas. Some examples of these ideas include blockchain, quantum …

Optimizing IoT Threat Mitigation with Artificial Intelligence in Banking: A Multi-Objective Approach

RPS Chauhan, SK Sonker, M Kaur… - 2024 2nd …, 2024 - ieeexplore.ieee.org
This research introduces a novel AI-based mechanism for optimizing threat mitigation in IoT
banking systems, addressing the growing vulnerabilities in this critical sector. The proposed …

A Review on Optimization and Feature Selection Techniques for Data Security in IoT

J Jose, JE Judith - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
Since IoT devices are becoming increasingly widespread, the security of IoT-dependent
networks gets highly significant. Because of the Internet of Things' fast global proliferation …

Cybersecurity in Industry 4.0 and Internet of Things: Challenges and Opportunities

H Teixeira, C Ascenção, J Gonçalves… - International conference on …, 2022 - Springer
This article provides an in-depth analysis of the challenges and opportunities associated
with cybersecurity in Industry 4.0 and the Internet of Things (IoT). The article highlights the …