A survey of android malware detection with deep neural models

J Qiu, J Zhang, W Luo, L Pan, S Nepal… - ACM Computing Surveys …, 2020 - dl.acm.org
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber
security research. Deep learning models have many advantages over traditional Machine …

A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling

L Lao, Z Li, S Hou, B Xiao, S Guo, Y Yang - ACM Computing Surveys …, 2020 - dl.acm.org
Blockchain technology can be extensively applied in diverse services, including online
micro-payments, supply chain tracking, digital forensics, health-care record sharing, and …

The rise of traffic classification in IoT networks: A survey

H Tahaei, F Afifi, A Asemi, F Zaki, NB Anuar - Journal of Network and …, 2020 - Elsevier
With the proliferation of the Internet of Things (IoT), the integration and communication of
various objects have become a prevalent practice. The huge growth of IoT devices and …

Machine learning algorithms to detect DDoS attacks in SDN

R Santos, D Souza, W Santo, A Ribeiro… - Concurrency and …, 2020 - Wiley Online Library
Summary Summary Software‐Defined Networking (SDN) is an emerging network paradigm
that has gained significant traction from many researchers to address the requirement of …

[HTML][HTML] A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

Managing IoT cyber-security using programmable telemetry and machine learning

A Sivanathan, HH Gharakheili… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber-security risks for Internet of Things (IoT) devices sourced from a diversity of vendors
and deployed in large numbers, are growing rapidly. Therefore, management of these …

Software vulnerability analysis and discovery using deep learning techniques: A survey

P Zeng, G Lin, L Pan, Y Tai, J Zhang - IEEE Access, 2020 - ieeexplore.ieee.org
Exploitable vulnerabilities in software have attracted tremendous attention in recent years
because of their potentially high severity impact on computer security and information safety …

Real network traffic collection and deep learning for mobile app identification

X Wang, S Chen, J Su - Wireless Communications and Mobile …, 2020 - Wiley Online Library
The proliferation of mobile devices over recent years has led to a dramatic increase in
mobile traffic. Demand for enabling accurate mobile app identification is coming as it is an …

Explaining deep learning-based traffic classification using a genetic algorithm

S Ahn, J Kim, SY Park, S Cho - IEEE Access, 2020 - ieeexplore.ieee.org
Traffic classification is widely used in various network functions such as software-defined
networking and network intrusion detection systems. Many traffic classification methods …

Classifying the traffic state of urban expressways: A machine-learning approach

Z Cheng, W Wang, J Lu, X Xing - … Research Part A: Policy and Practice, 2020 - Elsevier
The classification of the urban traffic state and its application is an important part of
intelligent transportation systems (ITS), which can not only help traffic managers grasp the …