A survey of deep learning methods for cyber security

DS Berman, AL Buczak, JS Chavis, CL Corbett - Information, 2019 - mdpi.com
This survey paper describes a literature review of deep learning (DL) methods for cyber
security applications. A short tutorial-style description of each DL method is provided …

Malicious URL detection using machine learning: A survey

D Sahoo, C Liu, SCH Hoi - arXiv preprint arXiv:1701.07179, 2017 - arxiv.org
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …

A survey on big data for network traffic monitoring and analysis

A D'Alconzo, I Drago, A Morichetta… - … on Network and …, 2019 - ieeexplore.ieee.org
Network Traffic Monitoring and Analysis (NTMA) represents a key component for network
management, especially to guarantee the correct operation of large-scale networks such as …

AI and machine learning: A mixed blessing for cybersecurity

F Kamoun, F Iqbal, MA Esseghir… - … Symposium on Networks …, 2020 - ieeexplore.ieee.org
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in
defensive cybersecurity has received considerable attention, there remains a noticeable …

Wafbooster: Automatic boosting of waf security against mutated malicious payloads

C Wu, J Chen, S Zhu, W Feng, K He… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Web application firewall (WAF) examines malicious traffic to and from a web application via
a set of security rules. It plays a significant role in securing Web applications against web …

Paying attention to cyber-attacks: A multi-layer perceptron with self-attention mechanism

FJ Rendón-Segador, JA Álvarez-García… - Computers & …, 2023 - Elsevier
Cyber-attacks cause huge monetary losses to the institutions that are victims of them. Cyber-
attack is becoming increasingly sophisticated. Therefore, the protection system against …

Mdfrcnn: Malware detection using faster region proposals convolution neural network

M Deore, U Kulkarni - 2022 - reunir.unir.net
Technological advancement of smart devices has opened up a new trend: Internet of
Everything (IoE), where all devices are connected to the web. Large scale networking …

DGA CapsNet: 1D application of capsule networks to DGA detection

DS Berman - Information, 2019 - mdpi.com
Domain generation algorithms (DGAs) represent a class of malware used to generate large
numbers of new domain names to achieve command-and-control (C2) communication …

Tomato plant growth promotion and drought tolerance conferred by three arbuscular mycorrhizal fungi is mediated by lipid metabolism

W Zhang, K Xia, Z Feng, Y Qin, Y Zhou, G Feng… - Plant Physiology and …, 2024 - Elsevier
Arbuscular mycorrhizal fungi (AMF) can promote plant growth and enhance plant drought
tolerance with varying effect size among different fungal species. However, the linkage …

Malicious website identification using design attribute learning

O Naim, D Cohen, I Ben-Gal - International Journal of Information Security, 2023 - Springer
Malicious websites pose a challenging cybersecurity threat. Traditional tools for detecting
malicious websites rely heavily on industry-specific domain knowledge, are maintained by …