Cyber security in smart cities: A review of deep learning-based applications and case studies
出版年份 2020 全文链接
标题
Cyber security in smart cities: A review of deep learning-based applications and case studies
作者
关键词
Smart cities, Cyber security, Deep learning, A review
出版物
Sustainable Cities and Society
Volume 66, Issue -, Pages 102655
出版商
Elsevier BV
发表日期
2020-12-16
DOI
10.1016/j.scs.2020.102655
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- An intrusion detection approach based on improved deep belief network
- (2020) Qiuting Tian et al. APPLIED INTELLIGENCE
- Byte-level malware classification based on markov images and deep learning
- (2020) Baoguo Yuan et al. COMPUTERS & SECURITY
- Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
- (2020) Muhammad Shafiq et al. Future Generation Computer Systems-The International Journal of eScience
- Assessment of coordinated development between social economy and ecological environment: Case study of resource-based cities in Northeastern China
- (2020) Weiwei Li et al. Sustainable Cities and Society
- A real-time and ubiquitous network attack detection based on deep belief network and support vector machine
- (2020) Hao Zhang et al. IEEE-CAA Journal of Automatica Sinica
- A system hierarchy for brain-inspired computing
- (2020) Youhui Zhang et al. NATURE
- A deep learning-based IoT-oriented infrastructure for secure smart City
- (2020) Sushil Kumar Singh et al. Sustainable Cities and Society
- Smart buildings features and key performance indicators: A review
- (2020) Joud Al Dakheel et al. Sustainable Cities and Society
- Ensemble sparse representation-based cyber threat hunting for security of smart cities
- (2020) Seyed Mehdi Hazrati Fard et al. COMPUTERS & ELECTRICAL ENGINEERING
- Personal exposure to airborne particles in transport micro-environments and potential health impacts: A tale of two cities
- (2020) Phuong T.M. Tran et al. Sustainable Cities and Society
- Protecting Water Infrastructure From Cyber and Physical Threats: Using Multimodal Data Fusion and Adaptive Deep Learning to Monitor Critical Systems
- (2019) Nikolaos Bakalos et al. IEEE SIGNAL PROCESSING MAGAZINE
- Deep packet: a novel approach for encrypted traffic classification using deep learning
- (2019) Mohammad Lotfollahi et al. SOFT COMPUTING
- Cyber Security Game for Intelligent Transportation Systems
- (2019) Hichem Sedjelmaci et al. IEEE NETWORK
- Resource Management in Fog/Edge Computing
- (2019) Cheol-Ho Hong et al. ACM COMPUTING SURVEYS
- Dynamic Malware Analysis in the Modern Era—A State of the Art Survey
- (2019) Ori Or-Meir et al. ACM COMPUTING SURVEYS
- Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues
- (2019) Arwa Aldweesh et al. KNOWLEDGE-BASED SYSTEMS
- Towards spike-based machine intelligence with neuromorphic computing
- (2019) Kaushik Roy et al. NATURE
- Deep recurrent neural network for IoT intrusion detection system
- (2019) Muder Almiani et al. SIMULATION MODELLING PRACTICE AND THEORY
- Towards smart sustainable cities: A review of the role digital citizen participation could play in advancing social sustainability
- (2019) Islam Bouzguenda et al. Sustainable Cities and Society
- A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities
- (2019) Hadi Habibzadeh et al. Sustainable Cities and Society
- Scalable Digital Neuromorphic Architecture for Large-Scale Biophysically Meaningful Neural Network With Multi-Compartment Neurons
- (2019) Shuangming Yang et al. IEEE Transactions on Neural Networks and Learning Systems
- Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
- (2019) Mohamed Amine Ferrag et al. Journal of Information Security and Applications
- Deep learning in agriculture: A survey
- (2018) Andreas Kamilaris et al. COMPUTERS AND ELECTRONICS IN AGRICULTURE
- MalDozer: Automatic framework for android malware detection using deep learning
- (2018) ElMouatez Billah Karbab et al. Digital Investigation
- Distributed attack detection scheme using deep learning approach for Internet of Things
- (2018) Abebe Abeshu Diro et al. Future Generation Computer Systems-The International Journal of eScience
- Detecting Android malware using Long Short-term Memory (LSTM)
- (2018) R. Vinayakumar et al. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- Generative adversarial network based telecom fraud detection at the receiving bank
- (2018) Yu-Jun Zheng et al. NEURAL NETWORKS
- Financial sector development and smart cities: The Indian case
- (2018) Rashmi Umesh Arora Sustainable Cities and Society
- Adaptive context aware decision computing paradigm for intensive health care delivery in smart cities—A case analysis
- (2018) Majed M. Aborokbah et al. Sustainable Cities and Society
- An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection
- (2018) Tamer Aldwairi et al. Computer Networks
- Deep forest
- (2018) Zhi-Hua Zhou et al. National Science Review
- Flow-based network traffic generation using Generative Adversarial Networks
- (2018) Markus Ring et al. COMPUTERS & SECURITY
- Intelligent VNFs Selection Based on Traffic Identification in Vehicular Cloud Networks
- (2018) Jingyu Wang et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Design and application of Internet of things-based warehouse management system for smart logistics
- (2017) C.K.M. Lee et al. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
- Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling
- (2017) W. Haider et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing
- (2016) Florian Skopik et al. COMPUTERS & SECURITY
- Deep learning
- (2015) Yann LeCun et al. NATURE
- Big Data Deep Learning: Challenges and Perspectives
- (2014) Xue-Wen Chen et al. IEEE Access
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection
- (2012) Ali Shiravi et al. COMPUTERS & SECURITY
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now