Artificial intelligence in cyber security: research advances, challenges, and opportunities

Z Zhang, H Ning, F Shi, F Farha, Y Xu, J Xu… - Artificial Intelligence …, 2022 - Springer
In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in
a broad range of cyber security applications. Therefore, this paper surveys the existing …

Social engineering attacks: A survey

F Salahdine, N Kaabouch - Future internet, 2019 - mdpi.com
The advancements in digital communication technology have made communication
between humans more accessible and instant. However, personal and sensitive information …

Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions

A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …

Blockchain and machine learning for communications and networking systems

Y Liu, FR Yu, X Li, H Ji… - … communications surveys & …, 2020 - ieeexplore.ieee.org
Recently, with the rapid development of information and communication technologies, the
infrastructures, resources, end devices, and applications in communications and networking …

Real-time big data processing for anomaly detection: A survey

RAA Habeeb, F Nasaruddin, A Gani… - International Journal of …, 2019 - Elsevier
The advent of connected devices and omnipresence of Internet have paved way for
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …

Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic

W Elmasry, A Akbulut, AH Zaim - Computer Networks, 2020 - Elsevier
The prevention of intrusion is deemed to be a cornerstone of network security. Although
excessive work has been introduced on network intrusion detection in the last decade …

Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Big data meet cyber-physical systems: A panoramic survey

R Atat, L Liu, J Wu, G Li, C Ye, Y Yang - IEEE Access, 2018 - ieeexplore.ieee.org
The world is witnessing an unprecedented growth of cyber-physical systems (CPS), which
are foreseen to revolutionize our world via creating new services and applications in a …

[HTML][HTML] An overview of superhydrophobic ceramic membrane surface modification for oil-water separation

J Usman, MHD Othman, AF Ismail, MA Rahman… - Journal of Materials …, 2021 - Elsevier
The discharge of oily wastewater and offshore oil spills contaminates the biotic and aquatic
environment and ultimately result in the destruction of the ecosystem. Recently, the …

Survey of security advances in smart grid: A data driven approach

S Tan, D De, WZ Song, J Yang… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
With the integration of advanced computing and communication technologies, smart grid is
considered as the next-generation power system, which promises self healing, resilience …