Author:
Alqahtani Abdulrahman Saad
Funder
The authors extend their appreciation to the Deanship of Scientific Research at University of Bisha for funding this research through the general research project
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference28 articles.
1. Ahmad, Z., Shahid Khan, A., Nisar, K., Haider, I., Hassan, R., Haque, M. R., Tarmizi, S., & Rodrigues, J. J. P. C. (2021). Anomaly detection using deep neural network for IoT architecture. Applied Sciences, 11, 7050.
2. Acronis Cyberthreats Report 2022: 20 Billion USD in Damage from Ransomware and other Cyber Attacks. Available online: https://www.acronis.com/en-eu/pr/2021/12/09-13-43.html (accessed on 10 May 2023).
3. Sun, N., Zhang, J., Rimba, P., Gao, S., Zhang, L. Y., & Xiang, Y. (2018). Data-driven cybersecurity incident prediction: A survey. IEEE Commun. Surv. Tutor., 21, 1744–1772.
4. Kim, T., & Pak, W. (2023). Deep learning-based network intrusion detection using multiple image transformers. Applied Sciences, 13, 2754. https://doi.org/10.3390/app13052754
5. Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). deep learning for cyber security intrusion detection: Approaches datasets and comparative study. Journal of Information Security and Application, 50, 102419.