[PDF][PDF] Convolutional Neural Networks with LSTM for Intrusion Detection.

M Ahsan, KE Nygard - CATA, 2020 - academia.edu
A variety of attacks are regularly attempted at network infrastructure. With the increasing
development of artificial intelligence algorithms, it has become effective to prevent network …

Security analysis of 5g network

JA Khan, MM Chowdhury - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
The popularity of mobile network connected devices continues to expand exponentially. An
estimated 5 billion devices exist worldwide. With the expansion of wearable devices, a …

[PDF][PDF] Ethical hacking: Skills to fight cybersecurity threats

L Smith, MM Chowdhury, S Latif - EPiC Series in Computing, 2022 - easychair.org
Ethical hacking education prepares future information security professionals with the tools
and skills to fight and prevent cybersecurity threats. Businesses, schools, governments, and …

The growing influence of ransomware

MA Mos, MM Chowdhury - 2020 IEEE International Conference …, 2020 - ieeexplore.ieee.org
Ransomware is a malicious cyber-attack in which a user's files are encrypted and rendered
inaccessible until the attacker receives a ransomed amount in return for the decryption key …

ChatGPT: The Curious Case of Attack Vectors' Supply Chain Management Improvement

M Chowdhury, N Rifat, S Latif, M Ahsan… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
The field of Natural Language Processing has observed significant advancements in the
development of sophisticated conversational Artificial Intelligence systems. ChatGPT is one …

Mobile security: A look into android

A Mos, MM Chowdhury - 2020 IEEE international conference on …, 2020 - ieeexplore.ieee.org
Mobile devices are used almost every day by a large population of the world. If your device
is not running Apple's operating system, it is most likely running Google's Android operating …

Managing the cyber world: Hacker edition

S Vandervelden, MM Chowdhury… - … Conference on Electrical …, 2021 - ieeexplore.ieee.org
When surfing the internet, your input data can be put into one website, but do we have any
concrete idea that who can see it. The hacking community lies within the bottom layers of the …

Linux security: A survey

MR Yaswinski, MM Chowdhury… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Linux is used in a large variety of situations, from private homes on personal machines to
businesses storing personal data on servers. This operating system is often seen as more …

Denial of service: A growing underrated threat

W Bonasera, MM Chowdhury… - … Conference on Electrical …, 2021 - ieeexplore.ieee.org
In the modern Internet age the use of networking for resources and services has become
routine in everyone's daily life. Whether it is accessing one's social media, online banking …

Internet of things device hardening using shodan. io and shovat: A survey

JS Rae, MDM Chowdhury… - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
The Internet of Things is becoming a topic of conversation more and more in the realm of
computer security. Broadband internet is widely more available now and the cost of …