A Review on the Effectiveness of Machine Learning and Deep Learning Algorithms for Cyber Security
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A Review on the Effectiveness of Machine Learning and Deep Learning Algorithms for Cyber Security
Authors
Keywords
-
Journal
ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2020-09-02
DOI
10.1007/s11831-020-09478-2
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- The Privacy Implications of Cyber Security Systems
- (2018) Eran Toch et al. ACM COMPUTING SURVEYS
- Machine learning-assisted signature and heuristic-based detection of malwares in Android devices
- (2018) Zahoor-Ur Rehman et al. COMPUTERS & ELECTRICAL ENGINEERING
- Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning
- (2018) Minh Hai Nguyen et al. COMPUTERS & SECURITY
- Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
- (2018) Sen Chen et al. COMPUTERS & SECURITY
- A prediction system of Sybil attack in social network using deep-regression model
- (2018) Muhammad Al-Qurishi et al. Future Generation Computer Systems-The International Journal of eScience
- Distributed attack detection scheme using deep learning approach for Internet of Things
- (2018) Abebe Abeshu Diro et al. Future Generation Computer Systems-The International Journal of eScience
- A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
- (2018) Hamed HaddadPajouh et al. Future Generation Computer Systems-The International Journal of eScience
- Discriminative Dimensionality Reduction for Multi-Dimensional Sequences
- (2018) Bing Su et al. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
- Task scheduling using Ant Colony Optimization in multicore architectures: a survey
- (2018) G. Umarani Srikanth et al. SOFT COMPUTING
- Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning
- (2018) George Loukas et al. IEEE Access
- A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends
- (2018) William Grant Hatcher et al. IEEE Access
- Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device
- (2018) Fang Feng et al. Ad Hoc Networks
- CNN and RNN based payload classification methods for attack detection
- (2018) Hongyu Liu et al. KNOWLEDGE-BASED SYSTEMS
- A Deep Learning Approach to on-Node Sensor Data Analytics for Mobile or Wearable Devices
- (2017) Daniele Ravi et al. IEEE Journal of Biomedical and Health Informatics
- A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
- (2017) Chuanlong Yin et al. IEEE Access
- Deep learning in big data Analytics: A comparative study
- (2017) Bilal Jan et al. COMPUTERS & ELECTRICAL ENGINEERING
- Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
- (2016) Nadav Schweitzer et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- On Binary Decomposition Based Privacy-Preserving Aggregation Schemes in Real-Time Monitoring Systems
- (2016) Xinyu Yang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A deep learning approach for detecting malicious JavaScript code
- (2016) Yao Wang et al. Security and Communication Networks
- Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security
- (2016) Min-Joo Kang et al. PLoS One
- Usenix Security Symposium
- (2011) IEEE SOFTWARE
- A Survey of Hardware Trojan Taxonomy and Detection
- (2010) Mohammad Tehranipoor et al. IEEE DESIGN & TEST OF COMPUTERS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search