To search, Click below search items.
All Published Papers Search Service
Title
Malware Detection Using Deep Recurrent Neural Networks with no Random Initialization
Author
Amir Namavar Jahromi and Sattar Hashemi
Vol. 23 No. 8 pp. 177-189
Keywords
Deep learning, Stacked LSTM, Unsupervised layer-wise pre-training, Malware, Cyber Threat Hunting.
Ontology Based-Security Issues for Internet of Thing (IoT): Ontology Development
Amir Mohamed Talib
Vol. 23 No. 8 pp. 168-176
Internet of Thing (IoT), Data Security, Information Security , Cyber Security, Ontology, Prot?g? and Web Ontology Language
Use of Blockchain to Support the Security of Internet of Things-A Review
Saher Un Nisa, Maryam Khalid
Vol. 23 No. 7 pp. 149-154
IoT (Internet of things), security, Privacy, Blockchain , Centralized , Decentralized.
CRF Based Intrusion Detection System using Genetic Search Feature Selection for NSSA
Azhagiri M, Rajesh A, Rajesh P, and Gowtham Sethupathi M
Vol. 23 No. 7 pp. 131-140
Network Security Situational Awareness (NSSA), Intrusion Detection System (IDS), Network Security, Intelligent Systems, Conditional Random Fields(CRF), Feature selection, Machine learning.