On the use of artificial intelligence to deal with privacy in IoT systems: A systematic literature review

G Giordano, F Palomba, F Ferrucci - Journal of Systems and Software, 2022 - Elsevier
Abstract The Internet of Things (IoT) refers to a network of Internet-enabled devices that can
make different operations, like sensing, communicating, and reacting to changes arising in …

A review of artificial intelligence based malware detection using deep learning

AAM Majid, AJ Alshaibi, E Kostyuchenko… - Materials Today …, 2023 - Elsevier
Malware propagation by adversaries has witnessed many issues across the globe. Often it is
found that malware is released in different countries for monetary gains. With the …

Hybrid malware detection based on Bi-LSTM and SPP-Net for smart IoT

J Jeon, B Jeong, S Baek… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this article, we propose the hybrid malware detection scheme, HyMalD, with bidirectional
long short-term memory (Bi-LSTM) and the spatial pyramid pooling network (SPP-Net). Its …

Ransomware detection based on opcode behavior using k-nearest neighbors algorithm

D Stiawan, SM Daely, A Heryanto, N Afifah… - … Technology and Control, 2021 - itc.ktu.lt
Ransomware Detection Based on Opcode Behaviour Using K-Nearest Neighbours Algorithm
Page 1 495 Information Technology and Control 2021/3/50 Ransomware Detection Based on …

[PDF][PDF] An Evaluation of Current Malware Trends and Defense Techniques: A Scoping Review with Empirical Case Studies

A Cletus, AA Opoku, BA Weyori - Journal of Advances in Information …, 2024 - jait.us
1 Department of Computer Science and Informatics, University of Energy and Natural
Resources, Sunyani, Ghana 2 Department of Mathematics and ICT, St. John Boscos College …

Efficient deep learning method for detection of malware attacks in internet of things networks

I Haouas, M Attia, L Hamel, M Graiet… - Asian Conference on …, 2024 - Springer
In uncontrolled environments, the IoT devices are vulnerable to many attacks in network
layer such as Malware Attack. The security of exchange data between the Internet of Things …

Detection of IoT malware based on forensic analysis of network traffic features

N Nimalasingam, J Senanayake… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
The usage of Internet of Things (IoT) devices is getting unavoidable lately, from handheld
devices to factory automated machines and even IoT embedded automotive vehicles. On …

Malware Detection Approaches Based on Operation Codes (OpCodes) of Executable Programs: A Review

MA Saleh - Indonesian Journal of Electrical Engineering and …, 2023 - section.iaesonline.com
A malicious software, or Malware for a short, poses a threat to computer systems, which
need to be analyzed, detected, and eliminated. Generally, malware is analyzed in two ways …

ECG signal analysis using emerging tools in current scenario of health informatics

V Gupta, Y Chaturvedi, NK Saxena… - … conference on cloud …, 2021 - ieeexplore.ieee.org
Health informatics is an important field which is responsible for overall growth of the
country's healthcare management. Today, cardiac related diseases are dominating around …