Artificial intelligence in cyber security: research advances, challenges, and opportunities
In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in
a broad range of cyber security applications. Therefore, this paper surveys the existing …
a broad range of cyber security applications. Therefore, this paper surveys the existing …
Social engineering attacks: A survey
F Salahdine, N Kaabouch - Future internet, 2019 - mdpi.com
The advancements in digital communication technology have made communication
between humans more accessible and instant. However, personal and sensitive information …
between humans more accessible and instant. However, personal and sensitive information …
Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions
A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …
proliferation in the number of Internet users has presented attackers with new detrimental …
Blockchain and machine learning for communications and networking systems
Recently, with the rapid development of information and communication technologies, the
infrastructures, resources, end devices, and applications in communications and networking …
infrastructures, resources, end devices, and applications in communications and networking …
Real-time big data processing for anomaly detection: A survey
The advent of connected devices and omnipresence of Internet have paved way for
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …
Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic
The prevention of intrusion is deemed to be a cornerstone of network security. Although
excessive work has been introduced on network intrusion detection in the last decade …
excessive work has been introduced on network intrusion detection in the last decade …
Detecting and preventing cyber insider threats: A survey
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …
security threats, the majority of which are originated by insiders. As insiders reside behind …
Big data meet cyber-physical systems: A panoramic survey
The world is witnessing an unprecedented growth of cyber-physical systems (CPS), which
are foreseen to revolutionize our world via creating new services and applications in a …
are foreseen to revolutionize our world via creating new services and applications in a …
[HTML][HTML] An overview of superhydrophobic ceramic membrane surface modification for oil-water separation
The discharge of oily wastewater and offshore oil spills contaminates the biotic and aquatic
environment and ultimately result in the destruction of the ecosystem. Recently, the …
environment and ultimately result in the destruction of the ecosystem. Recently, the …
Survey of security advances in smart grid: A data driven approach
With the integration of advanced computing and communication technologies, smart grid is
considered as the next-generation power system, which promises self healing, resilience …
considered as the next-generation power system, which promises self healing, resilience …