Review on machine learning and deep learning algorithms for IoT security

H Abdulkarim - International Journal of Nonlinear Analysis and …, 2023 - ijnaa.semnan.ac.ir
With its rapid expansion in more sectors, for instance, wearables, smart sensors, plus house
devices, the Internet of Things (IoT) is drifted to have a significant influence on many parts of …

Benchmarking the Bagging and Boosting (B & B) Algorithms for Modeling Optimized Autonomous Intrusion Detection Systems (AIDS)

S Upadhyaya, D Mehrotra - SN Computer Science, 2023 - Springer
The mapped mathematical models (MMMs) in machine learning are instrumental in
obtaining segregated yet effective solutions for security-specific scenarios in intrusion …

Towards Classification and Analysis of Ransomware Detection Techniques

M Ashraf, M Asif, MB Ahmad, A Ayaz… - 2023 4th …, 2023 - ieeexplore.ieee.org
Ransomware is a typical malware attack that has been increasing steadily over the last few
years. It encrypts users' data or removes significant material. The attackers ask for money to …

Portable Executable Header Based Ransomware Detection using Power Iteration and Artificial Neural Network

MP Singh, Y Karkhur - 2023 6th International Conference on …, 2023 - ieeexplore.ieee.org
In the present world, the dependency on different devices connected to the internet is
increasing at a rapid rate day by day. Devices like smart watches, mobile phones, personal …

[PDF][PDF] The role of mathematics in machine learning

M Patil, S Jadhav, S Talekar, V Bag - Journal of Data Acquisition …, 2023 - researchgate.net
Machine learning (ML) is the field of Computer Science that uses different models for
prediction, classification, and analysis. Machine learning is a Mathematical model …

[HTML][HTML] Identification technique of cryptomining behavior based on traffic features

L Dong, Z Li, X Li, X Wang, Y Liu - Frontiers in Physics, 2023 - frontiersin.org
Recently, the growth of blockchain technology and the economic benefits of
cryptocurrencies have led to a proliferation of malicious cryptomining activities on the …

Multi-level Data Integrity Model with Dual Immutable Digital Key Based Forensic Analysis in IoT Network

JVNR Deepthi, AK Khan, T Acharjee - SN Computer Science, 2023 - Springer
Over the last decade, the proliferation of Internet of Things (IoT) devices has risen
dramatically. The exponential growth of IoT device ecosystems has led to a rise in the risks …

Ransomware Detection Service: Execution and Analysis Using Machine Learning Techniques

S Badrinath, R Dodhi, R Muthalagu - Wireless Personal Communications, 2023 - Springer
Network security faces an escalating threat from hacker attacks due to the proliferation and
extensive adoption of computer and internet technology. Ransomware, a prevalent form of …

Cybersecurity in Internet of Things Networks using Deep Learning Models

V Anitha, CGN Kumar, R Kuchipudi… - … Computing and Data …, 2023 - ieeexplore.ieee.org
The Internet of Things and global grid that connects millions of sensors and devices have
made distributed software and services ubiquitous. IoT's vast reach and economic value …

Learning Explainable Multi-view Representations for Malware Authorship Attribution

I Adam, A Waagen, D Warmsley… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Malware poses an ever-growing threat to organizations, governments, and institutions. To
effectively combat its proliferation and development by threat actors, identifying the authors …