Deep learning for intrusion detection and security of Internet of things (IoT): current analysis, challenges, and possible solutions

AR Khan, M Kashif, RH Jhaveri, R Raut… - Security and …, 2022 - Wiley Online Library
In the last decade, huge growth is recorded globally in computer networks and Internet of
Things (IoT) networks due to the exponential data generation, approximately zettabyte to a …

Performance comparison and current challenges of using machine learning techniques in cybersecurity

K Shaukat, S Luo, V Varadharajan, IA Hameed, S Chen… - Energies, 2020 - mdpi.com
Cyberspace has become an indispensable factor for all areas of the modern world. The
world is becoming more and more dependent on the internet for everyday living. The …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks

K Shaukat, S Luo, V Varadharajan - Engineering Applications of Artificial …, 2022 - Elsevier
Malware is constantly evolving with rising concern for cyberspace. Deep learning-based
malware detectors are being used as a potential solution. However, these detectors are …

BCD-WERT: a novel approach for breast cancer detection using whale optimization based efficient features and extremely randomized tree algorithm

S Abbas, Z Jalil, AR Javed, I Batool, MZ Khan… - PeerJ Computer …, 2021 - peerj.com
Breast cancer is one of the leading causes of death in the current age. It often results in
subpar living conditions for a patient as they have to go through expensive and painful …

Exploring sybil and double-spending risks in blockchain systems

M Iqbal, R Matulevičius - IEEE Access, 2021 - ieeexplore.ieee.org
The first step to realise the true potential of blockchain systems is to explain the associated
security risks and vulnerabilities. These risks and vulnerabilities, exploited by the threat …

A Review on Machine Learning Strategies for Real‐World Engineering Applications

RH Jhaveri, A Revathi, K Ramana… - Mobile Information …, 2022 - Wiley Online Library
Huge amounts of data are circulating in the digital world in the era of the Industry 5.0
revolution. Machine learning is experiencing success in several sectors such as intelligent …

Fault-resilience for bandwidth management in industrial software-defined networks

RH Jhaveri, SV Ramani, G Srivastava… - … on Network Science …, 2021 - ieeexplore.ieee.org
Industrial Cyber-Physical Systems (ICPS) expect assurances of timely delivery of data even
during the occurrence of distinct faults. It is a challenge to manage the required bandwidth …

Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

Multi-label emotion classification of Urdu tweets

N Ashraf, L Khan, S Butt, HT Chang, G Sidorov… - PeerJ Computer …, 2022 - peerj.com
Urdu is a widely used language in South Asia and worldwide. While there are similar
datasets available in English, we created the first multi-label emotion dataset consisting of …