[HTML][HTML] A survey of deep learning methods for cyber security

DS Berman, AL Buczak, JS Chavis, CL Corbett - Information, 2019 - mdpi.com
This survey paper describes a literature review of deep learning (DL) methods for cyber
security applications. A short tutorial-style description of each DL method is provided …

A survey on deep learning for cybersecurity: Progress, challenges, and opportunities

M Macas, C Wu, W Fuertes - Computer Networks, 2022 - Elsevier
As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …

[HTML][HTML] HCRNNIDS: Hybrid convolutional recurrent neural network-based network intrusion detection system

MA Khan - Processes, 2021 - mdpi.com
Nowadays, network attacks are the most crucial problem of modern society. All networks,
from small to large, are vulnerable to network threats. An intrusion detection (ID) system is …

Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective

IH Sarker - SN Computer Science, 2021 - Springer
Deep learning, which is originated from an artificial neural network (ANN), is one of the
major technologies of today's smart cybersecurity systems or policies to function in an …

A visualized botnet detection system based deep learning for the internet of things networks of smart cities

R Vinayakumar, M Alazab, S Srinivasan… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Internet of Things applications for smart cities have currently become a primary target for
advanced persistent threats of botnets. This article proposes a botnet detection system …

A novel IoT network intrusion detection approach based on adaptive particle swarm optimization convolutional neural network

X Kan, Y Fan, Z Fang, L Cao, NN Xiong, D Yang… - Information Sciences, 2021 - Elsevier
In the field of network security, it is of great significance to accurately detect various types of
Internet of Things (IoT) network intrusion attacks which launched by the attacker-controlled …

[HTML][HTML] Land cover classification from fused DSM and UAV images using convolutional neural networks

HAH Al-Najjar, B Kalantar, B Pradhan, V Saeidi… - Remote Sensing, 2019 - mdpi.com
In recent years, remote sensing researchers have investigated the use of different modalities
(or combinations of modalities) for classification tasks. Such modalities can be extracted via …

Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2023 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

Multi‐aspects AI‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview

IH Sarker - Security and Privacy, 2023 - Wiley Online Library
Due to the rising dependency on digital technology, cybersecurity has emerged as a more
prominent field of research and application that typically focuses on securing devices …

[HTML][HTML] Artificial intelligence in the cyber domain: Offense and defense

TC Truong, QB Diep, I Zelinka - Symmetry, 2020 - mdpi.com
Artificial intelligence techniques have grown rapidly in recent years, and their applications in
practice can be seen in many fields, ranging from facial recognition to image analysis. In the …