Cyber security in smart cities: A review of deep learning-based applications and case studies
暂无分享,去创建一个
Zhihan Lv | Dongliang Chen | Pawel Wawrzynski | P. Wawrzynski | Zhihan Lv | Dongliang Chen | Pawel Wawrzynski
[1] Mashrur Chowdhury,et al. Long Short-Term Memory Neural Network-Based Attack Detection Model for In-Vehicle Network Security , 2020, IEEE Sensors Letters.
[2] Mesut Uğurlu,et al. A Survey on Deep Learning Based Intrusion Detection System , 2019, 2019 4th International Conference on Computer Science and Engineering (UBMK).
[3] Manoj Kumar Singh,et al. Moving towards smart cities: Solutions that lead to the Smart City Transformation Framework , 2020 .
[4] Zewen Li,et al. A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects , 2020, IEEE Transactions on Neural Networks and Learning Systems.
[5] Weishi Li,et al. An Internet of Vehicles Intrusion Detection System Based on a Convolutional Neural Network , 2019, 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom).
[6] Jingyu Wang,et al. Intelligent VNFs Selection Based on Traffic Identification in Vehicular Cloud Networks , 2019, IEEE Transactions on Vehicular Technology.
[7] Chaham Alalouch,et al. Towards smart sustainable cities: A review of the role digital citizen participation could play in advancing social sustainability , 2019, Sustainable Cities and Society.
[8] Kaushik Roy,et al. Towards spike-based machine intelligence with neuromorphic computing , 2019, Nature.
[9] Claudio Del Pero,et al. Smart buildings features and key performance indicators: A review , 2020 .
[10] Jin Wang,et al. Smart energy systems: A critical review on design and operation optimization , 2020, Sustainable Cities and Society.
[11] M. Efthymiopoulos. Cyber-security in smart cities: the case of Dubai , 2016 .
[12] Jong Hyuk Park,et al. A deep learning-based IoT-oriented infrastructure for secure smart City , 2020 .
[13] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[14] Md Zahangir Alom,et al. Network intrusion detection for cyber security using unsupervised deep learning approaches , 2017, 2017 IEEE National Aerospace and Electronics Conference (NAECON).
[15] Nirwan Ansari,et al. Cyber Security Game for Intelligent Transportation Systems , 2019, IEEE Network.
[16] Abdul Razaque,et al. Deep recurrent neural network for IoT intrusion detection system , 2020, Simul. Model. Pract. Theory.
[17] A. Rasekh,et al. Smart water networks and cyber security , 2016 .
[18] Xusheng Xiao,et al. An Image-Inspired and CNN-Based Android Malware Detection Approach , 2019, 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[19] João Paulo Papa,et al. Deep Boltzmann machines for robust fingerprint spoofing attack detection , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[20] Mark Stamp,et al. Convolutional neural networks for image spam detection , 2020, Inf. Secur. J. A Glob. Perspect..
[21] Andreas Hotho,et al. Flow-based Network Traffic Generation using Generative Adversarial Networks , 2018, Comput. Secur..
[22] Yu Zhang,et al. Very deep convolutional networks for end-to-end speech recognition , 2016, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[23] Mahdi Jafari Siavoshani,et al. Deep packet: a novel approach for encrypted traffic classification using deep learning , 2017, Soft Computing.
[24] Sung-Bae Cho,et al. Malware Detection Using Deep Transferred Generative Adversarial Networks , 2017, ICONIP.
[25] Lior Rokach,et al. Dynamic Malware Analysis in the Modern Era—A State of the Art Survey , 2019, ACM Comput. Surv..
[26] Daniel Gibert,et al. Using convolutional neural networks for classification of malware represented as images , 2018, Journal of Computer Virology and Hacking Techniques.
[27] Ying-Chang Liang,et al. Federated Learning in Mobile Edge Networks: A Comprehensive Survey , 2020, IEEE Communications Surveys & Tutorials.
[28] D. Gasper,et al. Human security thinking in practice: ‘personal security’, ‘citizen security' and comprehensive mappings , 2015 .
[29] Mingguo Zhao,et al. A system hierarchy for brain-inspired computing , 2020, Nature.
[30] Isra Al-Turaiki,et al. Mitigating Email Phishing Attacks using Convolutional Neural Networks , 2020, 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS).
[31] Yu Zhang,et al. Automatic Mobile Application Traffic Identification by Convolutional Neural Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[32] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[33] Xiran Zhang,et al. Network intrusion detection using generative adversarial networks. , 2020 .
[34] Tarek M. Taha,et al. Network intrusion detection for cyber security on neuromorphic computing system , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[35] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[36] Ji Feng,et al. Deep forest , 2017, IJCAI.
[37] V. Mojtahed. Big Data for Fraud Detection , 2019, Computational Social Sciences.
[38] Vadlamani Ravi,et al. WiP: Generative Adversarial Network for Oversampling Data in Credit Card Fraud Detection , 2019, ICISS.
[39] King Lun Choy,et al. Design and application of Internet of things-based warehouse management system for smart logistics , 2018, Int. J. Prod. Res..
[40] Daniel S. Berman,et al. A Survey of Deep Learning Methods for Cyber Security , 2019, Inf..
[41] Sagar Sabhadiya,et al. Android Malware Detection using Deep Learning , 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI).
[42] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[43] Florian Skopik,et al. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing , 2016, Comput. Secur..
[44] Yunyun Xie,et al. A Review of Cyber-Attack Methods in Cyber-Physical Power System , 2019, 2019 IEEE 8th International Conference on Advanced Power System Automation and Protection (APAP).
[45] Hossam Faris,et al. Fraud Detection Model Based on Multi-Verse Features Extraction Approach for Smart City Applications , 2019, Smart Cities Cybersecurity and Privacy.
[46] Xiaojiang Du,et al. Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city , 2020, Future Gener. Comput. Syst..
[47] Andreas Kamilaris,et al. Deep learning in agriculture: A survey , 2018, Comput. Electron. Agric..
[48] Yannis Charalabidis,et al. IoT and AI for Smart Government: A Research Agenda , 2019, Gov. Inf. Q..
[49] Gautam Srivastava,et al. Ensemble sparse representation-based cyber threat hunting for security of smart cities , 2020, Comput. Electr. Eng..
[50] Mansour Ahmadi,et al. Microsoft Malware Classification Challenge , 2018, ArXiv.
[51] K. P. Soman,et al. Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.
[52] Bin Deng,et al. Scalable Digital Neuromorphic Architecture for Large-Scale Biophysically Meaningful Neural Network With Multi-Compartment Neurons , 2020, IEEE Transactions on Neural Networks and Learning Systems.
[53] Yang Yi,et al. Enabling Sustainable Cyber Physical Security Systems through Neuromorphic Computing , 2018, IEEE Transactions on Sustainable Computing.
[54] Xinming Ou,et al. Cyber-physical-social interdependencies and organizational resilience: A review of water, transportation, and cyber infrastructure systems and processes , 2020 .
[55] Gian Luca Marcialis,et al. LivDet 2013 Fingerprint Liveness Detection Competition 2013 , 2013, 2013 International Conference on Biometrics (ICB).
[56] Xiaosong Zhang,et al. An Improved Convolutional Neural Network Model for Intrusion Detection in Networks , 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC).
[57] Danning Zhang,et al. Assessment of coordinated development between social economy and ecological environment: Case study of resource-based cities in Northeastern China , 2020 .
[58] Xiaobo Zhang,et al. A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection , 2018, Secur. Commun. Networks.
[59] Xue-wen Chen,et al. Big Data Deep Learning: Challenges and Perspectives , 2014, IEEE Access.
[60] Mounir Ghogho,et al. Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks , 2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft).
[61] Rong Wang,et al. Real-Time Network Intrusion Detection System Based on Deep Learning , 2019, 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS).
[62] Abdelouahid Derhab,et al. Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues , 2020, Knowl. Based Syst..
[63] R. Balasubramanian,et al. Personal exposure to airborne particles in transport micro-environments and potential health impacts: A tale of two cities , 2020 .
[64] A. Taufiq Asyhari,et al. Scalable machine learning-based intrusion detection system for IoT-enabled smart cities , 2020 .
[65] Muhammad Tariq,et al. Secure and resilient demand side management engine using machine learning for IoT-enabled smart grid , 2020 .
[66] Zsolt Szabó. Cybersecurity Issues in Industrial Control Systems , 2018, 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY).
[67] Mohamed Amine Ferrag,et al. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study , 2020, J. Inf. Secur. Appl..
[68] P. S. Sastry,et al. An Overview of Restricted Boltzmann Machines , 2019, Journal of the Indian Institute of Science.
[69] Rashmi Umesh Arora,et al. Financial sector development and smart cities: The Indian case , 2018, Sustainable Cities and Society.
[70] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[71] Girija Chetty,et al. Deep Learning Based Spam Detection System , 2019, 2019 International Conference on Machine Learning and Data Engineering (iCMLDE).
[72] Dong Liu,et al. Byte-level malware classification based on markov images and deep learning , 2020, Comput. Secur..
[73] K. P. Soman,et al. Detecting Android malware using Long Short-term Memory (LSTM) , 2018, J. Intell. Fuzzy Syst..
[74] Zhi-Ting Zhu,et al. A research framework of smart education , 2016, Smart Learning Environments.
[75] Justine Bedford,et al. Organizational Vulnerability to Insider Threat - What Do Australian Experts Say? , 2016, HCI.
[76] Burak Kantarci,et al. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities , 2019, Sustainable Cities and Society.
[77] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[78] M. A. Novotny,et al. An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection , 2018, Comput. Networks.
[79] Hui Han,et al. Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning , 2005, ICIC.
[80] Rashid Mehmood,et al. A Fog-Augmented Machine Learning based SMS Spam Detection and Classification System , 2020, 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC).
[81] Oluwarotimi Williams Samuel,et al. Adaptive context aware decision computing paradigm for intensive health care delivery in smart cities—A case analysis , 2017, Sustainable Cities and Society.
[82] Yu Xue,et al. Generative adversarial network based telecom fraud detection at the receiving bank , 2018, Neural Networks.
[83] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[84] Kuan-Ching Li,et al. An intrusion detection approach based on improved deep belief network , 2020, Applied Intelligence.
[85] Wei-Fa Zheng,et al. Intrusion Detection Based on Convolutional Neural Network , 2020, 2020 International Conference on Computer Engineering and Application (ICCEA).
[86] Avi Ostfeld,et al. Protecting Water Infrastructure From Cyber and Physical Threats: Using Multimodal Data Fusion and Adaptive Deep Learning to Monitor Critical Systems , 2019, IEEE Signal Processing Magazine.
[87] Ali A. Ghorbani,et al. Characterization of Tor Traffic using Time based Features , 2017, ICISSP.
[88] Razvan Pascanu,et al. On the difficulty of training recurrent neural networks , 2012, ICML.
[89] Shymalagowri Selvaganapathy,et al. Deep belief network based detection and categorization of malicious URLs , 2018, Inf. Secur. J. A Glob. Perspect..
[90] Ping Wang,et al. Using convolutional neural networks to network intrusion detection for cyber threats , 2018, 2018 IEEE International Conference on Applied System Invention (ICASI).
[91] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[92] Jiankun Hu,et al. Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling , 2017, J. Netw. Comput. Appl..
[93] Alireza Jolfaei,et al. Ransomware Triage Using Deep Learning: Twitter as a Case Study , 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC).
[94] Abdelouahid Derhab,et al. MalDozer: Automatic framework for android malware detection using deep learning , 2018, Digit. Investig..
[95] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[96] Yang Wang,et al. Evaluating Scalability Bottlenecks by Workload Extrapolation , 2018, 2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS).
[97] Arun Kumar Sangaiah,et al. A real-time and ubiquitous network attack detection based on deep belief network and support vector machine , 2020, IEEE/CAA Journal of Automatica Sinica.
[98] Sungroh Yoon,et al. How Generative Adversarial Networks and Their Variants Work , 2017, ACM Comput. Surv..
[99] Catherine D. Schuman,et al. A Survey of Neuromorphic Computing and Neural Networks in Hardware , 2017, ArXiv.