A survey of deep learning methods for cyber security
DS Berman, AL Buczak, JS Chavis, CL Corbett - Information, 2019 - mdpi.com
This survey paper describes a literature review of deep learning (DL) methods for cyber
security applications. A short tutorial-style description of each DL method is provided …
security applications. A short tutorial-style description of each DL method is provided …
Malicious URL detection using machine learning: A survey
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …
A survey on big data for network traffic monitoring and analysis
Network Traffic Monitoring and Analysis (NTMA) represents a key component for network
management, especially to guarantee the correct operation of large-scale networks such as …
management, especially to guarantee the correct operation of large-scale networks such as …
AI and machine learning: A mixed blessing for cybersecurity
While the usage of Artificial Intelligence and Machine Learning Software (AI/MLS) in
defensive cybersecurity has received considerable attention, there remains a noticeable …
defensive cybersecurity has received considerable attention, there remains a noticeable …
Wafbooster: Automatic boosting of waf security against mutated malicious payloads
Web application firewall (WAF) examines malicious traffic to and from a web application via
a set of security rules. It plays a significant role in securing Web applications against web …
a set of security rules. It plays a significant role in securing Web applications against web …
Paying attention to cyber-attacks: A multi-layer perceptron with self-attention mechanism
FJ Rendón-Segador, JA Álvarez-García… - Computers & …, 2023 - Elsevier
Cyber-attacks cause huge monetary losses to the institutions that are victims of them. Cyber-
attack is becoming increasingly sophisticated. Therefore, the protection system against …
attack is becoming increasingly sophisticated. Therefore, the protection system against …
Mdfrcnn: Malware detection using faster region proposals convolution neural network
M Deore, U Kulkarni - 2022 - reunir.unir.net
Technological advancement of smart devices has opened up a new trend: Internet of
Everything (IoE), where all devices are connected to the web. Large scale networking …
Everything (IoE), where all devices are connected to the web. Large scale networking …
DGA CapsNet: 1D application of capsule networks to DGA detection
DS Berman - Information, 2019 - mdpi.com
Domain generation algorithms (DGAs) represent a class of malware used to generate large
numbers of new domain names to achieve command-and-control (C2) communication …
numbers of new domain names to achieve command-and-control (C2) communication …
Tomato plant growth promotion and drought tolerance conferred by three arbuscular mycorrhizal fungi is mediated by lipid metabolism
W Zhang, K Xia, Z Feng, Y Qin, Y Zhou, G Feng… - Plant Physiology and …, 2024 - Elsevier
Arbuscular mycorrhizal fungi (AMF) can promote plant growth and enhance plant drought
tolerance with varying effect size among different fungal species. However, the linkage …
tolerance with varying effect size among different fungal species. However, the linkage …
Malicious website identification using design attribute learning
Malicious websites pose a challenging cybersecurity threat. Traditional tools for detecting
malicious websites rely heavily on industry-specific domain knowledge, are maintained by …
malicious websites rely heavily on industry-specific domain knowledge, are maintained by …