A survey of android malware detection with deep neural models
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber
security research. Deep learning models have many advantages over traditional Machine …
security research. Deep learning models have many advantages over traditional Machine …
A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling
Blockchain technology can be extensively applied in diverse services, including online
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …
The rise of traffic classification in IoT networks: A survey
With the proliferation of the Internet of Things (IoT), the integration and communication of
various objects have become a prevalent practice. The huge growth of IoT devices and …
various objects have become a prevalent practice. The huge growth of IoT devices and …
Machine learning algorithms to detect DDoS attacks in SDN
Summary Summary Software‐Defined Networking (SDN) is an emerging network paradigm
that has gained significant traction from many researchers to address the requirement of …
that has gained significant traction from many researchers to address the requirement of …
[HTML][HTML] A review on machine learning–based approaches for Internet traffic classification
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …
approaches have been proposed to classify Internet traffic to manage both security and …
Managing IoT cyber-security using programmable telemetry and machine learning
A Sivanathan, HH Gharakheili… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber-security risks for Internet of Things (IoT) devices sourced from a diversity of vendors
and deployed in large numbers, are growing rapidly. Therefore, management of these …
and deployed in large numbers, are growing rapidly. Therefore, management of these …
Software vulnerability analysis and discovery using deep learning techniques: A survey
Exploitable vulnerabilities in software have attracted tremendous attention in recent years
because of their potentially high severity impact on computer security and information safety …
because of their potentially high severity impact on computer security and information safety …
Real network traffic collection and deep learning for mobile app identification
X Wang, S Chen, J Su - Wireless Communications and Mobile …, 2020 - Wiley Online Library
The proliferation of mobile devices over recent years has led to a dramatic increase in
mobile traffic. Demand for enabling accurate mobile app identification is coming as it is an …
mobile traffic. Demand for enabling accurate mobile app identification is coming as it is an …
Explaining deep learning-based traffic classification using a genetic algorithm
Traffic classification is widely used in various network functions such as software-defined
networking and network intrusion detection systems. Many traffic classification methods …
networking and network intrusion detection systems. Many traffic classification methods …
Classifying the traffic state of urban expressways: A machine-learning approach
Z Cheng, W Wang, J Lu, X Xing - … Research Part A: Policy and Practice, 2020 - Elsevier
The classification of the urban traffic state and its application is an important part of
intelligent transportation systems (ITS), which can not only help traffic managers grasp the …
intelligent transportation systems (ITS), which can not only help traffic managers grasp the …