Filters








5,667 Hits in 2.4 sec

Survey on Applications of Deep Learning and Machine Learning Techniques for Cyber Security

Mohammed I. Alghamdi
<span title="">2020</span> <i title="Kassel University Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bnz2cocfqbamzln5r7zndevxnu" style="color: black;">International Journal of Interactive Mobile Technologies</a> </i> &nbsp;
The research aimed to conduct an extensive study of machine learning and deep learning methods in cybersecurity.  ...  The research has examined three machine learning methods and three deep learning methods to study the most popular techniques used in cybersecurity.  ...  Additionally, to extract most relevant researches, particular keywords were used, i.e., survey of machine learning and deep learning methods, machine learning and deep learning methods in cybersecurity  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3991/ijim.v14i16.16953">doi:10.3991/ijim.v14i16.16953</a> <a target="_blank" rel="external noopener" href="https://doaj.org/article/630bd6d43a51425ba094ccfe28068d4f">doaj:630bd6d43a51425ba094ccfe28068d4f</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/g2lbzcknzrf5lor7x2gvruo2jm">fatcat:g2lbzcknzrf5lor7x2gvruo2jm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201106045056/https://online-journals.org/index.php/i-jim/article/download/16953/7883" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/98/99/98993e34f075e4e5ec01912eb3af7d5ce15f4678.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3991/ijim.v14i16.16953"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Review on Cybersecurity based on Machine Learning and Deep Learning Algorithms

Alan Fuad Jahwar, Akre Technical College, Duhok Polytechnic University, Duhok, Kurdistan Region, IRAQ, Siddeeq Y. Ameen, Quality Assurance Directorate Duhok Polytechnic University, Duhok, Kurdistan Region, IRAQ
<span title="2021-10-15">2021</span> <i title="Penerbit UTHM"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zxkr4ycrsvegnm3kefysrbjzjq" style="color: black;">Journal of Soft Computing and Data Mining</a> </i> &nbsp;
Machin learning (ML) and Deep Learning (DL) technique have been widely applied to areas like image processing and speech recognition so far.  ...  We also discuss key elements of cybersecurity, the main principle of information security, and the most common methods used to threaten cybersecurity.  ...  Acknowledgment The authors would like to acknowledge Duhok Polytechnic University for providing all financial support and support for this study.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.30880/jscdm.2021.02.02.002">doi:10.30880/jscdm.2021.02.02.002</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cwrymm5kkfg43ll4zo7innpfhe">fatcat:cwrymm5kkfg43ll4zo7innpfhe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211101063740/https://publisher.uthm.edu.my/ojs/index.php/jscdm/article/download/8798/4556" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ad/92/ad92532208acaf70a6ed569f5ec68555f17b4e67.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.30880/jscdm.2021.02.02.002"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Cybersecurity data science: an overview from machine learning perspective

Iqbal H. Sarker, A. S. M. Kayes, Shahriar Badsha, Hamed Alqahtani, Paul Watters, Alex Ng
<span title="2020-07-01">2020</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pkhnkszyprhb3orbf6g7tqmgiu" style="color: black;">Journal of Big Data</a> </i> &nbsp;
Furthermore, we provide a machine learning based multi-layered framework for the purpose of cybersecurity modeling.  ...  To understand and analyze the actual phenomena with data, various scientific methods, machine learning techniques, processes, and systems are used, which is commonly known as data science.  ...  Acknowledgements The authors would like to thank all the reviewers for their rigorous review and comments in several revision rounds.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s40537-020-00318-5">doi:10.1186/s40537-020-00318-5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/i5qjz55m7fcudoxhstzlj3akzu">fatcat:i5qjz55m7fcudoxhstzlj3akzu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200720100500/https://journalofbigdata.springeropen.com/track/pdf/10.1186/s40537-020-00318-5" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9a/d8/9ad88785024fc3a3f421c748b8a09ba79d689ccf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s40537-020-00318-5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity

Kamran Shaukat, Suhuai Luo, Vijay Varadharajan, Ibrahim A. Hameed, Shan Chen, Dongxi Liu, Jiaming Li
<span title="2020-05-15">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/a2yvk5xhdnhpxjnk6yd33uudqq" style="color: black;">Energies</a> </i> &nbsp;
The objective of this survey is to bestow a brief review of different machine learning (ML) techniques to get to the bottom of all the developments made in detection methods for potential cybersecurity  ...  This work also expounds on the enormous current challenges and limitations faced during the application of machine learning techniques in cybersecurity.  ...  APC is paid by Norwegian University of Science and Technology, Norway. Conflicts of Interest: The authors declare no conflict of interest.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/en13102509">doi:10.3390/en13102509</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2sm42247bnfv3h2fchgy2w2634">fatcat:2sm42247bnfv3h2fchgy2w2634</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200528165748/https://res.mdpi.com/d_attachment/energies/energies-13-02509/article_deploy/energies-13-02509-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/23/0e/230e0c57c367a7c7394e049ede414da37823946b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/en13102509"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Adaptive Anomaly Detection Framework Model Objects in Cyberspace

Hasan Alkahtani, Theyazn H. H. Aldhyani, Mohammed Al-Yaari, Mohammed Yahya Alzahrani
<span title="2020-12-09">2020</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sgcj6txpjbc7djdaoaokofbzzy" style="color: black;">Applied Bionics and Biomechanics</a> </i> &nbsp;
A comparative result analysis between the machine learning algorithms, namely SVM and KNN, and the deep learning algorithms based on the LSTM-RNN model is presented.  ...  The deep learning based on Long-Short Term Memory Recurrent Neural Network (LSTM-RNN) and machine learning algorithms namely Support Vector Machine (SVM), K-Nearest Neighbor (K-NN) algorithms were implemented  ...  Acknowledgments The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia, for funding this research work through the project number IFT20177  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2020/6660489">doi:10.1155/2020/6660489</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/33376505">pmid:33376505</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC7746470/">pmcid:PMC7746470</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/weccfrpfzjghxleigaivt6p3ne">fatcat:weccfrpfzjghxleigaivt6p3ne</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201211070824/http://downloads.hindawi.com/journals/abb/2020/6660489.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/48/d2/48d24305f2379dee8788c4dae71bb2fd52225d7c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2020/6660489"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7746470" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Cybersecurity and Cyber Forensics: Machine Learning Approach

Ibrahim Goni, Jerome Mishion Gumpy, Timothy Umar Maigari, Murtala Muhammad, Abdulrahman Saidu
<span title="">2020</span> <i title="Science Publishing Group"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fhh7vpkckfagbbimgx3ah5c5j4" style="color: black;">Machine Learning Research</a> </i> &nbsp;
The aim of this work is make a systematic review on the application of machine learning algorithms to cybersecurity and cyber forensics, systematic survey method was used on recent application of machine  ...  and home and mobile working and pave away for further research directions on the application of deep learning, computational intelligence, soft computing to cybersecurity and cyber forensics.  ...  Machine learning algorithm was used to classified malware in android system in [16] . Machine learning and deep learning algorithm are combined and used for cyber security system in [15] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11648/j.mlr.20200504.11">doi:10.11648/j.mlr.20200504.11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y3sibwaapfamjjdwqnsfoh5zhy">fatcat:y3sibwaapfamjjdwqnsfoh5zhy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210918190739/http://article.sciencepublishinggroup.com/pdf/10.11648.j.mlr.20200504.11.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/95/0b/950b1f29d0537ec5e0c7de6a357060fa9272c577.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11648/j.mlr.20200504.11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Understanding Deep Learning Architecture to Various Problems of Cyber Security

Dr. Diwakar Ramanuj Tripathi
<span title="2021-12-31">2021</span> <i title="International Journal for Research in Applied Science and Engineering Technology (IJRASET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hsp44774azcezeyiq4kuzpfh5a" style="color: black;">International Journal for Research in Applied Science and Engineering Technology</a> </i> &nbsp;
Abstract: Traditional machine learning has evolved into deep learning. It's capable of extracting the best feature representation from raw input samples.  ...  Deep auto encoders, limited Boltzmann machines, recurrent neural networks, generative adversarial networks, and other DL methods are all described in this study in a brief tutorial-style method.  ...  Machine learning is a method for teaching a computer to discriminate between benign and harmful files.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22214/ijraset.2021.39349">doi:10.22214/ijraset.2021.39349</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bzbbhvip45bbbfkaspedqmu37m">fatcat:bzbbhvip45bbbfkaspedqmu37m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220202200809/https://www.ijraset.com/best-journal/understanding-deep-learning-architecture-to-various-problems-of-cyber-security" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f3/5c/f35c852677edf2b857178eb1d49225abc1d08850.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22214/ijraset.2021.39349"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Brute-force Black-box Method to Attack Machine Learning-Based Systems in Cybersecurity

Sicong Zhang, Xiaoyao Xie, Yang Xu
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
INDEX TERMS Adversarial examples, machine learning, deep learning, intrusion detection, malware detection, neural networks, black-box method.  ...  Machine learning algorithms are widely utilized in cybersecurity. However, recent studies show that machine learning algorithms are vulnerable to adversarial examples.  ...  Detection rate is a very important metric for machine learning classifiers in cybersecurity.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3008433">doi:10.1109/access.2020.3008433</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uzceirw3zbfpfavehzazqwtqoi">fatcat:uzceirw3zbfpfavehzazqwtqoi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210717100806/https://ieeexplore.ieee.org/ielx7/6287639/8948470/09138418.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/dd/5f/dd5ff8275bfa1de3d49390dbfee68818faba2650.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3008433"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Crossing Point of Artificial Intelligence in Cybersecurity

Praveen Kumar Donepudi
<span title="2015-12-31">2015</span> <i title="ABC Journals"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wqswi63c2bh55afpzwlakdkaoi" style="color: black;">American Journal of Trade and Policy</a> </i> &nbsp;
intelligence that upgrade cybersecurity, for example, machine learning, data mining, deep learning, and expert systems.  ...  On one hand, AI advancements, for example, deep learning, can be introduced into cybersecurity to develop smart models for executing malware classification and intrusion detection and threatening intelligent  ...  Also, numerous areas and uses of artificial intelligence can add to upgrading cybersecurity, for example, machine learning, deep learning, data mining, and expert systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18034/ajtp.v2i3.493">doi:10.18034/ajtp.v2i3.493</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7xnhwohhuvhzbetquabg7qtw2e">fatcat:7xnhwohhuvhzbetquabg7qtw2e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201106144605/https://abc.us.org/ojs/index.php/ajtp/article/download/493/979" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/42/fb/42fbd3dc72120f7f53593a81327ce6bb3f4c6224.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18034/ajtp.v2i3.493"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Artificial Intelligence in the Cyber Domain: Offense and Defense

Thanh Cong Truong, Quoc Bao Diep, Ivan Zelinka
<span title="2020-03-04">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nzoj5rayr5hutlurimhzyjlory" style="color: black;">Symmetry</a> </i> &nbsp;
In the cybersecurity domain, AI-based techniques can provide better cyber defense tools and help adversaries improve methods of attack.  ...  However, malicious actors are aware of the new prospects too and will probably attempt to use them for nefarious purposes.  ...  However, some of them just focused on the adopting machine learning methods for cyber problems such as those in [1] [2] [3] [4] . Other research [5, 6] just focused on deep learning methods.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/sym12030410">doi:10.3390/sym12030410</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7gyse3gaxjguhgkvfnbi7knkf4">fatcat:7gyse3gaxjguhgkvfnbi7knkf4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201107011616/http://dspace.vsb.cz/bitstream/handle/10084/139491/2073-8994-2020v12i3an410.pdf;jsessionid=45DF11CB26647FA1F8C774F4DA136A6A?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a5/fa/a5fa84d4e18e12f70adbd4025878c049feaf3645.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/sym12030410"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

An overview of the applications of Artificial Intelligence in Cybersecurity

Muhammad Akhtar, Tao Feng
<span title="2021-11-23">2021</span> <i title="European Alliance for Innovation n.o."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cvp4w5l3yjgohgud6gonvpwzsy" style="color: black;">EAI Endorsed Transactions on Creative Technologies</a> </i> &nbsp;
The rates at which cyber-attacks are performed have made the cybersecurity unprotected and make it impossible for the security experts to evaluate and combat every new type of cyber-attack.  ...  search engines and databases.  ...  Tao Feng, our project supervisor, for his unconditional support, instruction, and confidence.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4108/eai.23-11-2021.172218">doi:10.4108/eai.23-11-2021.172218</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/m54jl76vsnej5g3gb3xohlcnfa">fatcat:m54jl76vsnej5g3gb3xohlcnfa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211228222252/https://eudl.eu/pdf/10.4108/eai.23-11-2021.172218" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6b/e8/6be86af2a9388966fe5e426ed5f4d3908f29d8b5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4108/eai.23-11-2021.172218"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Linking Common Vulnerabilities and Exposures to the MITRE ATT CK Framework: A Self-Distillation Approach [article]

Benjamin Ampel, Sagar Samtani, Steven Ullman, Hsinchun Chen
<span title="2021-08-03">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Despite the tremendous benefits that both CVEs and the ATT&CK framework can provide for key cybersecurity stakeholders (e.g., analysts, educators, and managers), the two entities are currently separate  ...  A well-known cybersecurity risk management framework, MITRE ATT&CK, offers mitigation techniques for many malicious tactics.  ...  LITERATURE REVIEW CVE Data Machine Learning Large undertakings have been taken recently to use CVEs to improve other cybersecurity information systems through the use of classical machine and deep learning  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.01696v1">arXiv:2108.01696v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ntmdnk4m5rebtfzoslgvueetsa">fatcat:ntmdnk4m5rebtfzoslgvueetsa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210812034741/https://arxiv.org/ftp/arxiv/papers/2108/2108.01696.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bd/cf/bdcffd1d9ebfb1f48ef9334e5efb3ff33f48afb7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.01696v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Study on the Influence of Artificial Intelligence Research on the Development of Information Security Research

Tai-hoon Kim
<span title="2021-12-31">2021</span> <i title="Future Convergence Technology Research Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/r5lcr47lcnaodklgyozcp3425i" style="color: black;">Asia-pacific Journal of Convergent Research Interchange</a> </i> &nbsp;
In order to combat the growing complexity of cybercrime, more intelligent and effective cybersecurity defense methods must be developed.  ...  Researchers and practitioners should be familiar with current cyber security methods in order to assist in the solution of problems (Cybersecure).  ...  It is possible to increase cybersecurity with the help of machine learning and deep learning. It is possible to do research since data is essential for machine learning and deep learning.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47116/apjcri.2021.12.05">doi:10.47116/apjcri.2021.12.05</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e73lyec34rc4tnvfc5qolagyae">fatcat:e73lyec34rc4tnvfc5qolagyae</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220125220511/http://fucos.or.kr/journal/APJCRI/Articles/v7n12/5.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f7/1d/f71dd22624bf35d49c450fc4b8224e12f8ab3c27.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47116/apjcri.2021.12.05"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Study of Machine Learning Techniques in Cryptography for Cybersecurity

<span title="">2021</span> <i title="Society for Makers, Artist, Researchers and Technologists"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/osj7z2lyobclrmrhzjamyfk27a" style="color: black;">American Journal of Electronics &amp; Communication</a> </i> &nbsp;
Deep learning is an advanced field of machine learning which mainly uses deep neural network architecture.  ...  This paper attempts to summarize various machine learning based approaches for cryptanalysis along with discussions on the scope of application of deep learning techniques in cryptography.  ...  Deep Learning in Cryptography Deep learning is a field that is based on learning and improving on its own by examining the computer algorithms while machine learning uses simpler concepts.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15864/ajec1404">doi:10.15864/ajec1404</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/oam6pk5iknesdoo4nnuqwhn3ym">fatcat:oam6pk5iknesdoo4nnuqwhn3ym</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210710153150/https://ajec.smartsociety.org/wp-content/uploads/2021/07/4-Ankita-Saha.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7e/c1/7ec1dd5be6716895531c0bc815b33286edf92033.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15864/ajec1404"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

IEEE Access Special Section Editorial: Artificial Intelligence in Cybersecurity

Chi-Yuan Chen, Wei Quan, Nan Cheng, Shui Yu, Jong-Hyouk Lee, Gregorio Martínez Pérez, Hongke Zhang, Shiuhpyng Shieh
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
The article ''An empirical evaluation of deep learning for network anomaly detection,'' by Malaiya et al., designs and examines deep learning models constructed based on fully connected networks, variational  ...  The article ''Machine learning based file entropy analysis for ransomware detection in backup systems,'' by Lee et al., proposes to use machine learning for classifying infected files based on file entropy  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3021604">doi:10.1109/access.2020.3021604</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/access/ChenQCYLPZS20.html">dblp:journals/access/ChenQCYLPZS20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mjvkkgt3wjfo3ditb4eibdc3s4">fatcat:mjvkkgt3wjfo3ditb4eibdc3s4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201230020330/https://ieeexplore.ieee.org/ielx7/6287639/8948470/09199149.pdf?tp=&amp;arnumber=9199149&amp;isnumber=8948470&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c8/69/c869845f911e0b66fa18df137fcabaffc4f64c76.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.3021604"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 5,667 results