Deep learning techniques to detect cybersecurity attacks: a systematic mapping study

D Torre, F Mesadieu, A Chennamaneni - Empirical Software Engineering, 2023 - Springer
Context Recent years have seen a lot of attention into Deep Learning (DL) techniques used
to detect cybersecurity attacks. DL techniques can swiftly analyze massive datasets, and …

[HTML][HTML] Cyber threat intelligence for IoT using machine learning

S Mishra, A Albarakati, SK Sharma - Processes, 2022 - mdpi.com
The Internet of Things (IoT) is a technological revolution that enables human-to-human and
machine-to-machine communication for virtual data exchange. The IoT allows us to identify …

Novel hybrid model for intrusion prediction on cyber physical systems' communication networks based on bio-inspired deep neural network structure

AE Ibor, OB Okunoye, FA Oladeji… - Journal of Information …, 2022 - Elsevier
There are growing concerns on the security of communication networks of Cyber Physical
Systems (CPSs). In a typical Cyber Physical System (CPS), the plant, actuators, sensors and …

Hybrid fake news detection technique with genetic search and deep learning

OB Okunoye, AE Ibor - Computers and Electrical Engineering, 2022 - Elsevier
In recent years, there has been significant growth in the popularity of online social networks,
with a corresponding increase in the volume of information shared over the web. Text, audio …

Adaptive In‐Network Collaborative Caching for Enhanced Ensemble Deep Learning at Edge

Y Qin, D Wu, Z Xu, J Tian… - Mathematical Problems in …, 2021 - Wiley Online Library
To enhance the quality and speed of data processing and protect the privacy and security of
the data, edge computing has been extensively applied to support data‐intensive intelligent …

Hyperparameters Optimization of Convolutional Neural Networks using Evolutionary Algorithms

A Al-Hyari - … International Conference on Emerging Trends in …, 2022 - ieeexplore.ieee.org
This paper presents an approach for tuning hyperparameters in Convolutional Neural
Networks (CNNs) by adopting evolutionary algorithms, ie, Genetic Algorithms (GAs). CNNs …

[PDF][PDF] Deep Learning Techniques for Cyber-Attack Predictions in Organizations

N Bikki - 2024 - scholarworks.calstate.edu
In the modern digital era, organizations across the globe are being assaulted by rapid cyber-
attacks. As a result, early intruder detection within organizational networks is essential to …

Network Intrusion Prediction Model based on Bio-inspired Hyperparameter Search

A Ibor, F Oladeji, O Okunoye… - … on Electrical, Computer …, 2021 - ieeexplore.ieee.org
In recent years, predicting network intrusions has been a serious research concern in the
academia and industry due to the expanding attack surfaces. This unending trend of threat …

[PDF][PDF] MULTI-SHAPE SYMMETRIC ENCRYPTION MECHANISM FOR NON-GENERIC ATTACKS MITIGATION

AAA Abdelgader - 2022 - core.ac.uk
Static cyphers use static transformations for encryption and decryption. Therefore, the
attacker will have some knowledge that can be exploited to construct assaults since the …

Cyber-Physical Threat Intelligence for IoT Using Machine Learning

S Sonawane, R Gulwani - Internet of Things Vulnerabilities and Recovery … - taylorfrancis.com
IoT represents a significant technological advancement that facilitates the seamless
exchange of digital information through interconnected devices. This transformative …