A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is
Deep Learning applications are starting to pervade every commercial and technological sector. This paper surveys deep learning (DL) methods for cyber security applications, highlights the security considerations when using deep learning networks and presents possible malicious uses of such models. Initially, a brief description of the architectures studied and presented in this paper is provided. In the next section, the security applications are indicated for different models including CNNs,doi:10.33564/ijeast.2019.v04i08.023 fatcat:tc2ayamptnc2fehqc6n5trf4fq