Collection
Cybersecurity Management in the Era of AI
- Submission status
- Closed
This is a Special Issue on: Cybersecurity Management in the Era of AI.
Articles (20 in this collection)
-
-
Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder
Authors
- Samaneh Mahdavifar
- Dima Alhadidi
- Ali. A. Ghorbani
- Content type: OriginalPaper
- Published: 02 November 2021
- Article: 22
-
AntibotV: A Multilevel Behaviour-Based Framework for Botnets Detection in Vehicular Networks
Authors (first, second and last of 5)
- Rabah Rahal
- Abdelaziz Amara Korba
- Mohamed Yacine Ghamri-Doudane
- Content type: OriginalPaper
- Published: 20 October 2021
- Article: 15
-
Towards Model Generalization for Intrusion Detection: Unsupervised Machine Learning Techniques
Authors (first, second and last of 5)
- Miel Verkerken
- Laurens D’hooge
- Filip De Turck
- Content type: OriginalPaper
- Published: 17 October 2021
- Article: 12
-
PassMon: A Technique for Password Generation and Strength Estimation
Authors
- Sanjay Murmu
- Harsh Kasyap
- Somanath Tripathy
- Content type: OriginalPaper
- Published: 17 October 2021
- Article: 13
-
Human Immune-Based Intrusion Detection and Prevention System for Fog Computing
Authors (first, second and last of 4)
- Farouq Aliyu
- Tarek Sheltami
- Nidal Nasser
- Content type: OriginalPaper
- Published: 13 October 2021
- Article: 11
-
Deep Learning in IoT Intrusion Detection
Authors
- Stefanos Tsimenidis
- Thomas Lagkas
- Konstantinos Rantos
- Content type: OriginalPaper
- Published: 08 October 2021
- Article: 8
-
Personalized Privacy-Preserving Publication of Trajectory Data by Generalization and Distortion of Moving Points
Authors
- Samaneh Mahdavifar
- Fatemeh Deldar
- Hassan Mahdikhani
- Content type: OriginalPaper
- Published: 08 October 2021
- Article: 10
-
A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network
Authors
- P. R. Vishnu
- P. Vinod
- Suleiman Y. Yerima
- Content type: OriginalPaper
- Published: 08 October 2021
- Article: 9
-
Design of a Security and Trust Framework for 5G Multi-domain Scenarios
Authors (first, second and last of 8)
- José María Jorquera Valero
- Pedro Miguel Sánchez Sánchez
- Gregorio Martínez Pérez
- Content type: OriginalPaper
- Open Access
- Published: 08 October 2021
- Article: 7
-
Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System
Authors
- Qussai Yaseen
- Yaser Jararweh
- Content type: OriginalPaper
- Published: 17 June 2021
- Article: 45
-
An Ensemble Classifier Based Scheme for Detection of False Data Attacks Aiming at Disruption of Electricity Market Operation
Authors (first, second and last of 4)
- Prasanta Kumar Jena
- Subhojit Ghosh
- Murli Manohar
- Content type: OriginalPaper
- Published: 07 June 2021
- Article: 43
-
A Federated Learning Approach to Frequent Itemset Mining in Cyber-Physical Systems
Authors
- Usman Ahmed
- Gautam Srivastava
- Jerry Chun-Wei Lin
- Content type: OriginalPaper
- Open Access
- Published: 01 June 2021
- Article: 42
-
A Novel Lightweight Defense Method Against Adversarial Patches-Based Attacks on Automated Vehicle Make and Model Recognition Systems
Authors
- Abdul Jabbar Siddiqui
- Azzedine Boukerche
- Content type: OriginalPaper
- Published: 31 May 2021
- Article: 41
-
FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques
Authors (first, second and last of 4)
- Hong Liu
- Chen Zhong
- Sheikh Rabiul Islam
- Content type: OriginalPaper
- Published: 24 May 2021
- Article: 40
-
Cybersecurity of Smart Home Systems: Sensor Identity Protection
Authors (first, second and last of 4)
- Yazan Alshboul
- Abdel Al Raoof Bsoul
- Samer Samarah
- Content type: OriginalPaper
- Published: 04 March 2021
- Article: 22
-
AS-IDS: Anomaly and Signature Based IDS for the Internet of Things
Authors
- Yazan Otoum
- Amiya Nayak
- Content type: OriginalPaper
- Published: 04 March 2021
- Article: 23
-
URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models
Authors (first, second and last of 5)
- Sara Afzal
- Muhammad Asim
- Thar Baker
- Content type: OriginalPaper
- Published: 04 March 2021
- Article: 21
-
An Intelligent Tree-Based Intrusion Detection Model for Cyber Security
Authors (first, second and last of 5)
- Mohammad Al-Omari
- Majdi Rawashdeh
- Nedal Ababneh
- Content type: OriginalPaper
- Published: 21 February 2021
- Article: 20
-
Intelligent Secure Networking in In-band Full-duplex Dynamic Access Networks: Spectrum Management and Routing Protocol
Authors
- Haythem Bany Salameh
- Zainab Khader
- Ahmad Al Ajlouni
- Content type: OriginalPaper
- Published: 18 February 2021
- Article: 19