A State-of-the-Art Review of Malware Attack Trends and Defense Mechanism.

J Ferdous, R Islam, A Mahboubi, MZ Islam - IEEE Access, 2023 - ieeexplore.ieee.org
The increasing sophistication of malware threats has led to growing concerns in the anti-
malware community, as malware poses a significant danger to online users despite the …

[HTML][HTML] Systematic review of deep learning solutions for malware detection and forensic analysis in IoT

SU Qureshi, J He, S Tunio, N Zhu, A Nazir… - Journal of King Saud …, 2024 - Elsevier
The swift proliferation of Internet of Things (IoT) devices has presented considerable
challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract …

MalBoT-DRL: Malware botnet detection using deep reinforcement learning in IoT networks

M Al-Fawa'reh, J Abu-Khalaf… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In the dynamic landscape of cyber threats, multistage malware botnets have surfaced as
significant threats of concern. These sophisticated threats can exploit Internet of Things (IoT) …

[HTML][HTML] A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges

T Sasi, AH Lashkari, R Lu, P Xiong, S Iqbal - Journal of Information and …, 2023 - Elsevier
Abstract The Internet of Things (IoT) has set the way for the continuing digitalization of
society in various manners during the past decade. The IoT is a vast network of intelligent …

Machine learning and deep learning techniques for internet of things network anomaly detection—current research trends

SH Rafique, A Abdallah, NS Musa, T Murugan - Sensors, 2024 - mdpi.com
With its exponential growth, the Internet of Things (IoT) has produced unprecedented levels
of connectivity and data. Anomaly detection is a security feature that identifies instances in …

SNDMI: Spyware network traffic detection method based on inducement operations

J Peng, C Guo, Y Ping, Y Cui, Y Chen, G Shen - Computers & Security, 2024 - Elsevier
Spyware is a type of malware widely used by attackers to steal confidential information from
users without their knowledge. It has the characteristics of high latency, high stealth, and …

Trustworthy Artificial Intelligence Methods for Users' Physical and Environmental Security: A Comprehensive Review

S Szymoniak, F Depta, Ł Karbowiak, M Kubanek - Applied Sciences, 2023 - mdpi.com
Artificial Intelligence is an indispensable element of the modern world, constantly evolving
and contributing to the emergence of new technologies. We meet it in everyday applications …

Explainable AI for Human-Centric Ethical IoT Systems

PN Mahalle, RV Patil, N Dey, RG Crespo… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The current era witnesses the notable transition of society from an information-centric to a
human-centric one aiming at striking a balance between economic advancements and …

Attention mechanism based intelligent channel feedback for mmWave massive MIMO systems

Y Zhang, J Sun, G Gui, Y Lin, H Gacanin, H Sari… - Peer-to-Peer Networking …, 2024 - Springer
The potential advantages of intelligent wireless communications with millimeter wave
(mmWave) and massive multiple-input multiple-output (MIMO) are based on the availability …

Machine Learning Algorithms for Intrusion Detection in IoT-enabled Smart Homes

A Adamova, T Zhukabayeva, N Adamov - Procedia Computer Science, 2024 - Elsevier
Abstract The Internet of Things provides many useful opportunities and makes everyday life
easier. At the same time, when interacting with the Internet of Things, a large amount of …