A systematic review on machine learning and deep learning models for electronic information security in mobile networks

C Gupta, I Johri, K Srinivasan, YC Hu, SM Qaisar… - Sensors, 2022 - mdpi.com
Today's advancements in wireless communication technologies have resulted in a
tremendous volume of data being generated. Most of our information is part of a widespread …

A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis

S Muneer, U Farooq, A Athar… - Journal of …, 2024 - Wiley Online Library
Intrusion detection (ID) is critical in securing computer networks against various malicious
attacks. Recent advancements in machine learning (ML), deep learning (DL), federated …

Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization

IF Kilincer, F Ertam, A Sengur, RS Tan… - Biocybernetics and …, 2023 - Elsevier
Widespread proliferation of interconnected healthcare equipment, accompanying software,
operating systems, and networks in the Internet of Medical Things (IoMT) raises the risk of …

Towards a universal privacy model for electronic health record systems: an ontology and machine learning approach

R Nowrozy, K Ahmed, H Wang, T Mcintosh - Informatics, 2023 - mdpi.com
This paper proposed a novel privacy model for Electronic Health Records (EHR) systems
utilizing a conceptual privacy ontology and Machine Learning (ML) methodologies. It …

Apollon: a robust defense system against adversarial machine learning attacks in intrusion detection systems

A Paya, S Arroni, V García-Díaz, A Gómez - Computers & Security, 2024 - Elsevier
Abstract The rise of Adversarial Machine Learning (AML) attacks is presenting a significant
challenge to Intrusion Detection Systems (IDS) and their ability to detect threats. To address …

Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review

S Messinis, N Temenos, NE Protonotarios… - Computers in Biology …, 2024 - Elsevier
Over the past five years, interest in the literature regarding the security of the Internet of
Medical Things (IoMT) has increased. Due to the enhanced interconnectedness of IoMT …

Empowering cyberattack identification in IoHT networks with neighborhood component-based improvised long short-term memory

M Kumar, C Kim, Y Son, SK Singh… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Cybersecurity has become an inevitable concern in the healthcare industry due to the rapid
growth of the Internet of Health Things (IoHT). The IoHT is revolutionizing healthcare by …

Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions

PV Mohan, S Dixit, A Gyaneshwar, U Chadha… - Sensors, 2022 - mdpi.com
With information systems worldwide being attacked daily, analogies from traditional warfare
are apt, and deception tactics have historically proven effective as both a strategy and a …

Cyber attack detection in healthcare data using cyber-physical system with optimized algorithm

F Alrowais, HG Mohamed, FN Al-Wesabi… - Computers and …, 2023 - Elsevier
A medical cyber-physical system (MCPS) integrates medical sensor devices with cyber
(information) components, which creates a sensitive approach and provides security. The …

Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system

MA Alohali, M Elsadig, FN Al-Wesabi… - Computers and …, 2023 - Elsevier
To provide remote access, surveillance, and analysis, network integration is common in
Cyber-Physical Systems (CPSs). This leads to cyber attacks due to the integration of …