Funder
Princess Nourah bint Abdulrahman University
King Saud University
Reference24 articles.
1. B. Geluvaraj, P.M. Satwik, T.A. Ashok KumarThe future of cybersecurity: Major role of artificial intelligence, machine learning, and deep learning in cyberspace, In: Proceedings of the International Conference on Computer Networks and Communication Technologies, Garden City University, Bangalore, pp. 739–747, 2019. .
2. Cyber threat detection based on artificial neural networks using event profiles;Lee;IEEE Access,2019
3. Convolutional neural network for intrusion detection system In cyber physical systems;Teyou;ArXiv Comput. Sci.,2019
4. E. Hodo, X. Bellekens, A. Hamilton, P. DubouilhThreat analysis of IoT networks using artificial neural network intrusion detection system, In: Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC), Tunisia, pp. 1–6, 2016. .
5. LSTM and Bat-Based RUSBoost approach for electricity theft detection;Adil;Appl. Sci.,2020