On the use of artificial intelligence to deal with privacy in IoT systems: A systematic literature review
Abstract The Internet of Things (IoT) refers to a network of Internet-enabled devices that can
make different operations, like sensing, communicating, and reacting to changes arising in …
make different operations, like sensing, communicating, and reacting to changes arising in …
A review of artificial intelligence based malware detection using deep learning
AAM Majid, AJ Alshaibi, E Kostyuchenko… - Materials Today …, 2023 - Elsevier
Malware propagation by adversaries has witnessed many issues across the globe. Often it is
found that malware is released in different countries for monetary gains. With the …
found that malware is released in different countries for monetary gains. With the …
Hybrid malware detection based on Bi-LSTM and SPP-Net for smart IoT
In this article, we propose the hybrid malware detection scheme, HyMalD, with bidirectional
long short-term memory (Bi-LSTM) and the spatial pyramid pooling network (SPP-Net). Its …
long short-term memory (Bi-LSTM) and the spatial pyramid pooling network (SPP-Net). Its …
Ransomware detection based on opcode behavior using k-nearest neighbors algorithm
Ransomware Detection Based on Opcode Behaviour Using K-Nearest Neighbours Algorithm
Page 1 495 Information Technology and Control 2021/3/50 Ransomware Detection Based on …
Page 1 495 Information Technology and Control 2021/3/50 Ransomware Detection Based on …
[PDF][PDF] An Evaluation of Current Malware Trends and Defense Techniques: A Scoping Review with Empirical Case Studies
A Cletus, AA Opoku, BA Weyori - Journal of Advances in Information …, 2024 - jait.us
1 Department of Computer Science and Informatics, University of Energy and Natural
Resources, Sunyani, Ghana 2 Department of Mathematics and ICT, St. John Boscos College …
Resources, Sunyani, Ghana 2 Department of Mathematics and ICT, St. John Boscos College …
Efficient deep learning method for detection of malware attacks in internet of things networks
In uncontrolled environments, the IoT devices are vulnerable to many attacks in network
layer such as Malware Attack. The security of exchange data between the Internet of Things …
layer such as Malware Attack. The security of exchange data between the Internet of Things …
Detection of IoT malware based on forensic analysis of network traffic features
N Nimalasingam, J Senanayake… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
The usage of Internet of Things (IoT) devices is getting unavoidable lately, from handheld
devices to factory automated machines and even IoT embedded automotive vehicles. On …
devices to factory automated machines and even IoT embedded automotive vehicles. On …
Malware Detection Approaches Based on Operation Codes (OpCodes) of Executable Programs: A Review
MA Saleh - Indonesian Journal of Electrical Engineering and …, 2023 - section.iaesonline.com
A malicious software, or Malware for a short, poses a threat to computer systems, which
need to be analyzed, detected, and eliminated. Generally, malware is analyzed in two ways …
need to be analyzed, detected, and eliminated. Generally, malware is analyzed in two ways …
ECG signal analysis using emerging tools in current scenario of health informatics
Health informatics is an important field which is responsible for overall growth of the
country's healthcare management. Today, cardiac related diseases are dominating around …
country's healthcare management. Today, cardiac related diseases are dominating around …