Skip to main content
Erschienen in: Artificial Intelligence Review 7/2022

04.02.2022

The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges

verfasst von: Muhammad Waqas, Shanshan Tu, Zahid Halim, Sadaqat Ur Rehman, Ghulam Abbas, Ziaul Haq Abbas

Erschienen in: Artificial Intelligence Review | Ausgabe 7/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security is one of the biggest challenges concerning networks and communications. The problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence (AI) has emerged as a promising solution and a volume of literature exists on the methodological studies of AI to resolve the security challenge. In this survey, we present a taxonomy of security threats and review distinct aspects and the potential of AI to resolve the challenge. To the best of our knowledge, this is the first comprehensive survey to review the AI solutions for all possible security types and threats. We also present the lessons learned from the existing AI techniques and contributions of up-to-date literature, future directions of AI in security, open issues that need to be investigated further through AI, and discuss how AI can be more effectively used to overcome the upcoming advanced security threats.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
Zurück zum Zitat Ahmed M, Shi H, Chen X, Li Y, Waqas M, Jin D (2018a) Socially aware secrecy-ensured resource allocation in D2D underlay communication: an overlapping coalitional game scheme. IEEE Trans Wirel Commun 17(6):4118–4133 Ahmed M, Shi H, Chen X, Li Y, Waqas M, Jin D (2018a) Socially aware secrecy-ensured resource allocation in D2D underlay communication: an overlapping coalitional game scheme. IEEE Trans Wirel Commun 17(6):4118–4133
Zurück zum Zitat Ahmed M, Li Y, Waqas M, Sheraz M, Jin D, Han Z (2018b) A survey on socially aware device-to-device communications. IEEE Commun Surv Tutor 20(3):2169–2197 Ahmed M, Li Y, Waqas M, Sheraz M, Jin D, Han Z (2018b) A survey on socially aware device-to-device communications. IEEE Commun Surv Tutor 20(3):2169–2197
Zurück zum Zitat Ahuja R, Chug A, Gupta S, Ahuja P, Kohli S (2020) Classification and clustering algorithms of machine learning with their applications. In: Yang X-S, He X-S (eds) Nature-inspired computation in data mining and machine learning. Springer, pp 225–248 Ahuja R, Chug A, Gupta S, Ahuja P, Kohli S (2020) Classification and clustering algorithms of machine learning with their applications. In: Yang X-S, He X-S (eds) Nature-inspired computation in data mining and machine learning. Springer, pp 225–248
Zurück zum Zitat Alauthaman M, Aslam N, Zhang L, Alasem R, Hossain MA (2018) A P2P botnet detection scheme based on decision tree and adaptive multilayer neural networks. Neural Comput Appl 29(11):991–1004CrossRef Alauthaman M, Aslam N, Zhang L, Alasem R, Hossain MA (2018) A P2P botnet detection scheme based on decision tree and adaptive multilayer neural networks. Neural Comput Appl 29(11):991–1004CrossRef
Zurück zum Zitat Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160CrossRef Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160CrossRef
Zurück zum Zitat Alom MZ, Bontupalli V, Taha TM (2015) Intrusion detection using deep belief networks. In: National aerospace and electronics conference (NAECON), pp 339–344 Alom MZ, Bontupalli V, Taha TM (2015) Intrusion detection using deep belief networks. In: National aerospace and electronics conference (NAECON), pp 339–344
Zurück zum Zitat Ambekar A, Schotten HD (2014) Enhancing channel reciprocity for effective key management in wireless ad-hoc networks. In: IEEE 79th vehicular technology conference (VTC Spring), pp 1–5 Ambekar A, Schotten HD (2014) Enhancing channel reciprocity for effective key management in wireless ad-hoc networks. In: IEEE 79th vehicular technology conference (VTC Spring), pp 1–5
Zurück zum Zitat Ameen N, Tarhini A, Shah MH, Madichie NO (2020) Employees’ behavioural intention to smartphone security: a gender-based. Cross-national study. Comput Hum Behav 104:106184CrossRef Ameen N, Tarhini A, Shah MH, Madichie NO (2020) Employees’ behavioural intention to smartphone security: a gender-based. Cross-national study. Comput Hum Behav 104:106184CrossRef
Zurück zum Zitat Amuru S, Tekin C, v der Schaar M, Buehrer RM (2016) Jamming bandits: a novel learning method for optimal jamming. IEEE Trans Wirel Commun 15(4):2792–2808CrossRef Amuru S, Tekin C, v der Schaar M, Buehrer RM (2016) Jamming bandits: a novel learning method for optimal jamming. IEEE Trans Wirel Commun 15(4):2792–2808CrossRef
Zurück zum Zitat Amuru S, Buehrer RM (2014) Optimal jamming strategies in digital communications impact of modulation. In: IEEE global communications conference, pp 1619–1624 Amuru S, Buehrer RM (2014) Optimal jamming strategies in digital communications impact of modulation. In: IEEE global communications conference, pp 1619–1624
Zurück zum Zitat Prasad R, Rohokale V (2020) Malware. In: Cyber security: the lifeline of information and communication technology. Springer, Berlin, pp 67–81 Prasad R, Rohokale V (2020) Malware. In: Cyber security: the lifeline of information and communication technology. Springer, Berlin, pp 67–81
Zurück zum Zitat Anjomshoa F, Kantarci B, Erol-Kantarci M, Schuckers S (2017) Detection of spoofed identities on smartphones via sociability metrics. In: IEEE international conference on communications (ICC), pp 1–6 Anjomshoa F, Kantarci B, Erol-Kantarci M, Schuckers S (2017) Detection of spoofed identities on smartphones via sociability metrics. In: IEEE international conference on communications (ICC), pp 1–6
Zurück zum Zitat Ayodeji O et al (2021) Security and privacy for artificial intelligence: opportunities and challenges. arXiv:2102.04661 Ayodeji O et al (2021) Security and privacy for artificial intelligence: opportunities and challenges. arXiv:2102.04661
Zurück zum Zitat Batra L, Taneja H (2020) Evaluating volatile stock markets using information theoretic measures. Phys A Stat Mech Appl 537:122711CrossRef Batra L, Taneja H (2020) Evaluating volatile stock markets using information theoretic measures. Phys A Stat Mech Appl 537:122711CrossRef
Zurück zum Zitat Belciug S, Gorunescu F (2020) Era of intelligent systems in healthcare. In: Dorgham MA (ed) Intelligent decision support systems-a journey to smarter healthcare. Springer, Berlin, pp 1–55 Belciug S, Gorunescu F (2020) Era of intelligent systems in healthcare. In: Dorgham MA (ed) Intelligent decision support systems-a journey to smarter healthcare. Springer, Berlin, pp 1–55
Zurück zum Zitat Bellet A, Liang Y, Garakani AB, Balcan MF, Sha F (2015) A distributed Frank–Wolfe algorithm for communication efficient sparse learning. In: Proceedings of the 2015 SIAM international conference on data mining, pp 478–486 Bellet A, Liang Y, Garakani AB, Balcan MF, Sha F (2015) A distributed Frank–Wolfe algorithm for communication efficient sparse learning. In: Proceedings of the 2015 SIAM international conference on data mining, pp 478–486
Zurück zum Zitat Bernal P (2020) What do we know and what should we do about internet privacy? SAGE Publications Limited, Thousand OaksCrossRef Bernal P (2020) What do we know and what should we do about internet privacy? SAGE Publications Limited, Thousand OaksCrossRef
Zurück zum Zitat Bhuyan MH, Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16(1):303–336CrossRef Bhuyan MH, Bhattacharyya DK, Kalita JK (2013) Network anomaly detection: methods, systems and tools. IEEE Commun Surv Tutor 16(1):303–336CrossRef
Zurück zum Zitat Bill L, Curtis W, Bedford D, Iyer S (2019) The knowledge economy: implications for organizations. Work and workers, knowledge economies and knowledge work (Working methods for knowledge management), pp 41–64 Bill L, Curtis W, Bedford D, Iyer S (2019) The knowledge economy: implications for organizations. Work and workers, knowledge economies and knowledge work (Working methods for knowledge management), pp 41–64
Zurück zum Zitat Blatt D, Hero AO, Gauchman H (2007) A convergent incremental gradient method with a constant step size. SIAM J Optim 18(1):29–51MathSciNetMATHCrossRef Blatt D, Hero AO, Gauchman H (2007) A convergent incremental gradient method with a constant step size. SIAM J Optim 18(1):29–51MathSciNetMATHCrossRef
Zurück zum Zitat Boureau Y-L, Ponce J, LeCun Y (2010) A theoretical analysis of feature pooling in visual recognition. In: Proceedings of the 27th international conference on machine learning, pp 111–118 Boureau Y-L, Ponce J, LeCun Y (2010) A theoretical analysis of feature pooling in visual recognition. In: Proceedings of the 27th international conference on machine learning, pp 111–118
Zurück zum Zitat Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Commu Surv Tutor 18(2):1153–1176CrossRef Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Commu Surv Tutor 18(2):1153–1176CrossRef
Zurück zum Zitat Butt UJ, Abbod MF, Kumar A (2020) Cyber threat ransomware and marketing to networked consumers. In: Dadwal SS (ed) Handbook of research on innovations in technology and marketing for the connected consumer. IGI Global, pp 155–185 Butt UJ, Abbod MF, Kumar A (2020) Cyber threat ransomware and marketing to networked consumers. In: Dadwal SS (ed) Handbook of research on innovations in technology and marketing for the connected consumer. IGI Global, pp 155–185
Zurück zum Zitat Caravelli J, Jones N (2019) Cyber crime. In: Paige D (ed) Cyber security: threats and responses for government and business. ABC-CLIO, pp 23–43 Caravelli J, Jones N (2019) Cyber crime. In: Paige D (ed) Cyber security: threats and responses for government and business. ABC-CLIO, pp 23–43
Zurück zum Zitat Chatterjee B, Das D, Maity S, Sen S (2019) RF-PUF: enhancing IoT security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J 6(1):388–398CrossRef Chatterjee B, Das D, Maity S, Sen S (2019) RF-PUF: enhancing IoT security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J 6(1):388–398CrossRef
Zurück zum Zitat Chen J, Yu Q, Cheng P, Sun Y, Fan Y, Shen X (2011) Game theoretical approach for channel allocation in wireless sensor and actuator networks. IEEE Trans Autom Control 56(10):2332–2344MathSciNetMATHCrossRef Chen J, Yu Q, Cheng P, Sun Y, Fan Y, Shen X (2011) Game theoretical approach for channel allocation in wireless sensor and actuator networks. IEEE Trans Autom Control 56(10):2332–2344MathSciNetMATHCrossRef
Zurück zum Zitat Chen Y, Zhang Y, Maharjan S (2017) Deep learning for secure mobile edge computing. CoRR arxiv: abs/1709.08025 Chen Y, Zhang Y, Maharjan S (2017) Deep learning for secure mobile edge computing. CoRR arxiv: abs/1709.08025
Zurück zum Zitat Chen G, Zhan Y, Chen Y, Xiao L, Wang Y, An N (2018a) Reinforcement learning based power control for in-body sensors in WBANS against jamming. IEEE Access 6:37403–37412 Chen G, Zhan Y, Chen Y, Xiao L, Wang Y, An N (2018a) Reinforcement learning based power control for in-body sensors in WBANS against jamming. IEEE Access 6:37403–37412
Zurück zum Zitat Chen Y, Poskitt CM, Sun J (2018b) Learning from mutants: using code mutation to learn and monitor invariants of a cyber-physical system. In: IEEE symposium on security and privacy, pp 648–660 Chen Y, Poskitt CM, Sun J (2018b) Learning from mutants: using code mutation to learn and monitor invariants of a cyber-physical system. In: IEEE symposium on security and privacy, pp 648–660
Zurück zum Zitat Chen L, Yi Z, Chen X (2020) Research on network security technology based on artificial intelligence. In: Kacprzyk J (ed) Recent trends in intelligent computing, communication and devices. Springer, Berlin, pp 729–735 Chen L, Yi Z, Chen X (2020) Research on network security technology based on artificial intelligence. In: Kacprzyk J (ed) Recent trends in intelligent computing, communication and devices. Springer, Berlin, pp 729–735
Zurück zum Zitat Chernov D, Sornette D (2020) Specific features of risk management in the industrial and agricultural sectors. In: Critical risks of different economic sectors. Springer, Berlin, pp 13–145 Chernov D, Sornette D (2020) Specific features of risk management in the industrial and agricultural sectors. In: Critical risks of different economic sectors. Springer, Berlin, pp 13–145
Zurück zum Zitat Conley WG, Miller AJ (2013) Cognitive jamming game for dynamically countering ad-hoc cognitive radio networks. In: MILCOM 2013—2013 IEEE military communications conference, pp 1176–1182 Conley WG, Miller AJ (2013) Cognitive jamming game for dynamically countering ad-hoc cognitive radio networks. In: MILCOM 2013—2013 IEEE military communications conference, pp 1176–1182
Zurück zum Zitat Connor OP (2019) 2019 security lockdown or hacker bonanza. ITNOW 61(4):44–45CrossRef Connor OP (2019) 2019 security lockdown or hacker bonanza. ITNOW 61(4):44–45CrossRef
Zurück zum Zitat Dai HN et al (2019) Big data analytics for large-scale wireless networks: challenges and opportunities. ACM Comput Surv (CSUR) 52(5):1–36CrossRef Dai HN et al (2019) Big data analytics for large-scale wireless networks: challenges and opportunities. ACM Comput Surv (CSUR) 52(5):1–36CrossRef
Zurück zum Zitat de Mello FL (2020) A survey on machine learning adversarial attacks. J Inf Secur Cryptogr (Enigma) 7(1):1–7MathSciNetCrossRef de Mello FL (2020) A survey on machine learning adversarial attacks. J Inf Secur Cryptogr (Enigma) 7(1):1–7MathSciNetCrossRef
Zurück zum Zitat Diesch R, Pfaff M, Krcmar H (2020) A comprehensive model of information security factors for decision-makers. Comput Secur 92:101747CrossRef Diesch R, Pfaff M, Krcmar H (2020) A comprehensive model of information security factors for decision-makers. Comput Secur 92:101747CrossRef
Zurück zum Zitat Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768CrossRef Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener Comput Syst 82:761–768CrossRef
Zurück zum Zitat Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd international conference on information systems security and privacy (ICISSP), pp 407–414 Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of encrypted and VPN traffic using time-related. In: Proceedings of the 2nd international conference on information systems security and privacy (ICISSP), pp 407–414
Zurück zum Zitat Emami C, Smith RG, Jorna P (2019) Predicting online fraud victimisation in Australia. Trends Issues Crime Crim Justice no 577, p 1 Emami C, Smith RG, Jorna P (2019) Predicting online fraud victimisation in Australia. Trends Issues Crime Crim Justice no 577, p 1
Zurück zum Zitat Eslahi M, Yousefi M, Var Naseri M, Yussof YM, Tahir N, Hashim H (2016) Mobile botnet detection model based on retrospective pattern recognition. Int J Secur Appl 10:39–44 Eslahi M, Yousefi M, Var Naseri M, Yussof YM, Tahir N, Hashim H (2016) Mobile botnet detection model based on retrospective pattern recognition. Int J Secur Appl 10:39–44
Zurück zum Zitat Fatma S et al (2020) Modelling perceived risks to personal privacy from location disclosure on online social networks. Int J Geogr Inf Sci 34(1):150–176CrossRef Fatma S et al (2020) Modelling perceived risks to personal privacy from location disclosure on online social networks. Int J Geogr Inf Sci 34(1):150–176CrossRef
Zurück zum Zitat Feng Q, Dou Z, Li C, Si G (2017a) Anomaly detection of spectrum in wireless communication via deep autoencoder. In: Advances in computer science and ubiquitous computing, pp 259–265 Feng Q, Dou Z, Li C, Si G (2017a) Anomaly detection of spectrum in wireless communication via deep autoencoder. In: Advances in computer science and ubiquitous computing, pp 259–265
Zurück zum Zitat Feng C, Wu S, Liu N (2017b) A user-centric machine learning framework for cybersecurity operations center. In: IEEE international conference on intelligence and security informatics (ISI), pp 173–175 Feng C, Wu S, Liu N (2017b) A user-centric machine learning framework for cybersecurity operations center. In: IEEE international conference on intelligence and security informatics (ISI), pp 173–175
Zurück zum Zitat Fiore U, Palmieri F, Castiglione A, De Santis A (2013) Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122:13–23CrossRef Fiore U, Palmieri F, Castiglione A, De Santis A (2013) Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122:13–23CrossRef
Zurück zum Zitat Forecast CGMDT (2016) Update Report, 2014–2019, Cisco white paper Forecast CGMDT (2016) Update Report, 2014–2019, Cisco white paper
Zurück zum Zitat Geogen G, Poovammal E (2020) Mobile malware, securing the internet of things: concepts, methodologies, tools, and applications. IGI Global, Hershey, pp 92–108 Geogen G, Poovammal E (2020) Mobile malware, securing the internet of things: concepts, methodologies, tools, and applications. IGI Global, Hershey, pp 92–108
Zurück zum Zitat Gopalsamy BN, Brindha G, Santhi B (2020) Implementation of machine learning in network security. In: Solanki A, Kumar S, Nayyar A (eds) Handbook of research on emerging trends and applications of machine learning. IGI Global, pp 276–299 Gopalsamy BN, Brindha G, Santhi B (2020) Implementation of machine learning in network security. In: Solanki A, Kumar S, Nayyar A (eds) Handbook of research on emerging trends and applications of machine learning. IGI Global, pp 276–299
Zurück zum Zitat Gu X, Li X (2016) A detection method for network security based on the combination of support vector machine. In: Third international conference on artificial intelligence and pattern recognition (AIPR), pp 1–5 Gu X, Li X (2016) A detection method for network security based on the combination of support vector machine. In: Third international conference on artificial intelligence and pattern recognition (AIPR), pp 1–5
Zurück zum Zitat Gupta V, Sharma E (2018) Mitigating DNS amplification attacks using a set of geographically distributed SDN routers. In: IEEE international conference on advances in computing, communications and informatics (ICACCI), pp 392–400 Gupta V, Sharma E (2018) Mitigating DNS amplification attacks using a set of geographically distributed SDN routers. In: IEEE international conference on advances in computing, communications and informatics (ICACCI), pp 392–400
Zurück zum Zitat Gurbuzbalaban M, Ozdaglar A, Parrilo PA (2017) On the convergence rate of incremental aggregated gradient algorithms. SIAM J Optim 27(2):1035–1048MathSciNetMATHCrossRef Gurbuzbalaban M, Ozdaglar A, Parrilo PA (2017) On the convergence rate of incremental aggregated gradient algorithms. SIAM J Optim 27(2):1035–1048MathSciNetMATHCrossRef
Zurück zum Zitat Gwon YL, Kung H (2014) Inferring origin flow patterns in wi-fi with deep learning. In: 11th international conference on autonomic computing, pp 73–83 Gwon YL, Kung H (2014) Inferring origin flow patterns in wi-fi with deep learning. In: 11th international conference on autonomic computing, pp 73–83
Zurück zum Zitat Gwon Y, Dastangoo S, Fossa C, Kung H (2013) Competing mobile network game: embracing anti-jamming and jamming strategies with reinforcement learning. In: IEEE conference on communications and network security (CNS), pp 28–36 Gwon Y, Dastangoo S, Fossa C, Kung H (2013) Competing mobile network game: embracing anti-jamming and jamming strategies with reinforcement learning. In: IEEE conference on communications and network security (CNS), pp 28–36
Zurück zum Zitat Hajoary PK, Akhilesh K (2020) Role of government in tackling cybersecurity threat. In: Akhilesh KB, Möller DPF (eds) Smart technologies. Springer, pp 79–96 Hajoary PK, Akhilesh K (2020) Role of government in tackling cybersecurity threat. In: Akhilesh KB, Möller DPF (eds) Smart technologies. Springer, pp 79–96
Zurück zum Zitat Hamedani K, Liu L, Atat R, Wu J, Yi Y (2018) Reservoir computing meets smart grids: attack detection using delayed feedback networks. IEEE Trans Ind Inf 14(2):734–743CrossRef Hamedani K, Liu L, Atat R, Wu J, Yi Y (2018) Reservoir computing meets smart grids: attack detection using delayed feedback networks. IEEE Trans Ind Inf 14(2):734–743CrossRef
Zurück zum Zitat Han Y, Alpcan T, Chan J, Leckie C, Rubinstein BI (2016) A game theoretical approach to defend against co-resident attacks in cloud computing: preventing co-residence using semi-supervised learning. IEEE Trans Inf Forensics Secur 11(3):556–570CrossRef Han Y, Alpcan T, Chan J, Leckie C, Rubinstein BI (2016) A game theoretical approach to defend against co-resident attacks in cloud computing: preventing co-residence using semi-supervised learning. IEEE Trans Inf Forensics Secur 11(3):556–570CrossRef
Zurück zum Zitat Hartong MW, Roddy SA (2020) An information theoretic approach to platform technology selection to aid influence operations. IEEE Syst J 14(4):5308–5319 Hartong MW, Roddy SA (2020) An information theoretic approach to platform technology selection to aid influence operations. IEEE Syst J 14(4):5308–5319
Zurück zum Zitat Haus M, Waqas M, Ding AY, Li Y, Tarkoma S, Ott J (2017) Security and privacy in device-to-device (D2D) communication: a review. IEEE Commun Surv Tutor 19(2):1054–1079CrossRef Haus M, Waqas M, Ding AY, Li Y, Tarkoma S, Ott J (2017) Security and privacy in device-to-device (D2D) communication: a review. IEEE Commun Surv Tutor 19(2):1054–1079CrossRef
Zurück zum Zitat He P, Gan G (2020) Android malicious APP detection based on CNN deep learning algorithm. In: IOP conference series: earth and environmental science, vol 428, no 1, p 012061 He P, Gan G (2020) Android malicious APP detection based on CNN deep learning algorithm. In: IOP conference series: earth and environmental science, vol 428, no 1, p 012061
Zurück zum Zitat He X, Dai H, Ning P (2016) Faster learning and adaptation in security games by exploiting information asymmetry. IEEE Trans Signal Process 64(13):3429–3443MathSciNetMATHCrossRef He X, Dai H, Ning P (2016) Faster learning and adaptation in security games by exploiting information asymmetry. IEEE Trans Signal Process 64(13):3429–3443MathSciNetMATHCrossRef
Zurück zum Zitat Head B (2019) Breach of faith. Co Dir 35(9):62 Head B (2019) Breach of faith. Co Dir 35(9):62
Zurück zum Zitat Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: a taxonomy and survey. arXiv:1701.02145 Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: a taxonomy and survey. arXiv:1701.02145
Zurück zum Zitat Hou S, Saas A, Chen L, Ye Y (2016) Deep4maldroid: a deep learning framework for android malware detection based on linux kernel system call graphs. In: 2016 IEEE/WIC/ACM international conference on web intelligence workshops (WIW), pp 104–111 Hou S, Saas A, Chen L, Ye Y (2016) Deep4maldroid: a deep learning framework for android malware detection based on linux kernel system call graphs. In: 2016 IEEE/WIC/ACM international conference on web intelligence workshops (WIW), pp 104–111
Zurück zum Zitat Huang X, Lu Y, Li D, Ma M (2018) A novel mechanism for fast detection of transformed data leakage. IEEE Access 6:35 926-35 936CrossRef Huang X, Lu Y, Li D, Ma M (2018) A novel mechanism for fast detection of transformed data leakage. IEEE Access 6:35 926-35 936CrossRef
Zurück zum Zitat Huang L, Joseph AD, Nelson B, Rubinstein BI, Tygar JD (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on security and artificial intelligence, pp 43–58 Huang L, Joseph AD, Nelson B, Rubinstein BI, Tygar JD (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on security and artificial intelligence, pp 43–58
Zurück zum Zitat Jaggi M (2013) Revisiting Frank–Wolfe: projection-free sparse convex optimization. In: ICML (1), pp 427–435 Jaggi M (2013) Revisiting Frank–Wolfe: projection-free sparse convex optimization. In: ICML (1), pp 427–435
Zurück zum Zitat Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies, pp 21–26 Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies, pp 21–26
Zurück zum Zitat Jiang Z, Zhao J, Li X-Y, Han J, Xi W (2013) Rejecting the attack: source authentication for wi-fi management frames using CSI information. In: Proceedings IEEE INFOCOM, pp 2544–2552 Jiang Z, Zhao J, Li X-Y, Han J, Xi W (2013) Rejecting the attack: source authentication for wi-fi management frames using CSI information. In: Proceedings IEEE INFOCOM, pp 2544–2552
Zurück zum Zitat Jiang C, Zhang H, Ren Y, Han Z, Kwang KC, Lajos H (2016) Machine learning paradigms for next-generation wireless networks. IEEE Wirel Commun 24(2):98–105CrossRef Jiang C, Zhang H, Ren Y, Han Z, Kwang KC, Lajos H (2016) Machine learning paradigms for next-generation wireless networks. IEEE Wirel Commun 24(2):98–105CrossRef
Zurück zum Zitat Jing Q, Vasilakos AV, Wan J et al (2014) Security of the Internet of Things: perspectives and challenges. Wirel Netw 20:2481–2501CrossRef Jing Q, Vasilakos AV, Wan J et al (2014) Security of the Internet of Things: perspectives and challenges. Wirel Netw 20:2481–2501CrossRef
Zurück zum Zitat Jonathan OA, Oeldorf-Hirsch A (2020) The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Inf Commun Soc 23(1):128–147CrossRef Jonathan OA, Oeldorf-Hirsch A (2020) The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Inf Commun Soc 23(1):128–147CrossRef
Zurück zum Zitat Kang M-J, Kang J-W (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6):e0155781CrossRef Kang M-J, Kang J-W (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6):e0155781CrossRef
Zurück zum Zitat Keetharuth BS, Forbes AN, Simmons WP (2019) Increasing legal protections at the international, regional and national levels for human rights defenders working in Africa and Asia E-WEL-2016-5378, September 2016–August 2019 Keetharuth BS, Forbes AN, Simmons WP (2019) Increasing legal protections at the international, regional and national levels for human rights defenders working in Africa and Asia E-WEL-2016-5378, September 2016–August 2019
Zurück zum Zitat Khan MA, Khan S, Shams B, Lloret J (2016) Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks. Secur Commun Netw 9(15):2715–2729CrossRef Khan MA, Khan S, Shams B, Lloret J (2016) Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks. Secur Commun Netw 9(15):2715–2729CrossRef
Zurück zum Zitat Kharraz A, Robertson W, Kirda E (2018) Surveylance: automatically detecting online survey scams. In: IEEE symposium on security and privacy, pp 70–86 Kharraz A, Robertson W, Kirda E (2018) Surveylance: automatically detecting online survey scams. In: IEEE symposium on security and privacy, pp 70–86
Zurück zum Zitat Kömürcü G, Dündar G (2012) Determining the quality metrics for PUFs and performance evaluation of two RO-PUFs. In: 10th IEEE international NEWCAS conference, pp 73–76 Kömürcü G, Dündar G (2012) Determining the quality metrics for PUFs and performance evaluation of two RO-PUFs. In: 10th IEEE international NEWCAS conference, pp 73–76
Zurück zum Zitat Kwon D, Kim H, Kim J, Suh SC, Kim I, Kim KJ A (2017) Survey of deep learning-based network anomaly detection, cluster computing Kwon D, Kim H, Kim J, Suh SC, Kim I, Kim KJ A (2017) Survey of deep learning-based network anomaly detection, cluster computing
Zurück zum Zitat Larriva-Novo XA, Vega-Barbas M, Villagrá VA, Rodrigo MS (2020) Evaluation of cybersecurity data set characteristics for their applicability to neural networks algorithms detecting cybersecurity anomalies. IEEE Access 8:9005–9014CrossRef Larriva-Novo XA, Vega-Barbas M, Villagrá VA, Rodrigo MS (2020) Evaluation of cybersecurity data set characteristics for their applicability to neural networks algorithms detecting cybersecurity anomalies. IEEE Access 8:9005–9014CrossRef
Zurück zum Zitat Lee JH, Kim H (2017) Security and privacy challenges in the Internet of Things [Security and privacy matters]. IEEE Consum Electron Mag 6(3):134–136CrossRef Lee JH, Kim H (2017) Security and privacy challenges in the Internet of Things [Security and privacy matters]. IEEE Consum Electron Mag 6(3):134–136CrossRef
Zurück zum Zitat Lheureux A, Grolinger K, Elyamany HF, Capretz MA (2017) Machine learning with big data: challenges and approaches. IEEE Access 5:7776–7797CrossRef Lheureux A, Grolinger K, Elyamany HF, Capretz MA (2017) Machine learning with big data: challenges and approaches. IEEE Access 5:7776–7797CrossRef
Zurück zum Zitat Li JH (2019) Cyber security meets artificial intelligence: a survey. Front Inf Technol Electron Eng 19:1462–1474CrossRef Li JH (2019) Cyber security meets artificial intelligence: a survey. Front Inf Technol Electron Eng 19:1462–1474CrossRef
Zurück zum Zitat Li W, Huang J (2018) Mobile physical layer spoofing detection based on sparse representation. IET Commun 12(14):1709–1713CrossRef Li W, Huang J (2018) Mobile physical layer spoofing detection based on sparse representation. IET Commun 12(14):1709–1713CrossRef
Zurück zum Zitat Li P, Liu Q, Zhao W, Wang D, Wang S (2018) Chronic poisoning against machine learning based IDSS using edge pattern detection. In.:IEEE international conference on communications (ICC), pp 1–7 Li P, Liu Q, Zhao W, Wang D, Wang S (2018) Chronic poisoning against machine learning based IDSS using edge pattern detection. In.:IEEE international conference on communications (ICC), pp 1–7
Zurück zum Zitat Lin Q, Tu S, Waqas M, ur Rehman S, Chang CC (2019) Tracking areas planning based on spectral clustering in small cell networks. IET Commun 13(13):1921–1927CrossRef Lin Q, Tu S, Waqas M, ur Rehman S, Chang CC (2019) Tracking areas planning based on spectral clustering in small cell networks. IET Commun 13(13):1921–1927CrossRef
Zurück zum Zitat Liu FJ, Wang X, Primak SL (2013) A two dimensional quantization algorithm for CIR-based physical layer authentication. In: IEEE international conference on communications (ICC), pp 4724–4728 Liu FJ, Wang X, Primak SL (2013) A two dimensional quantization algorithm for CIR-based physical layer authentication. In: IEEE international conference on communications (ICC), pp 4724–4728
Zurück zum Zitat Liu H, Wang Y, Liu J, Yang J, Chen Y (2014) Practical user authentication leveraging channel state information (csi). In: Proceedings of the 9th ACM symposium on information, computer and communications security, pp 389–400 Liu H, Wang Y, Liu J, Yang J, Chen Y (2014) Practical user authentication leveraging channel state information (csi). In: Proceedings of the 9th ACM symposium on information, computer and communications security, pp 389–400
Zurück zum Zitat Liu M, Tu S, Xiao C, Waqas M, ur Rehman S, Aamir M, Chang CC (2020a) The allocation and reuse scheme of physical cell identifications based on maximum degree first coloring algorithm. IEEE Syst J 14(1):582–591 Liu M, Tu S, Xiao C, Waqas M, ur Rehman S, Aamir M, Chang CC (2020a) The allocation and reuse scheme of physical cell identifications based on maximum degree first coloring algorithm. IEEE Syst J 14(1):582–591
Zurück zum Zitat Liu X, Lin Y, Li H, Zhang J (2020b) A novel method for malware detection on ML-based visualization technique. Comput Secur 89:101682CrossRef Liu X, Lin Y, Li H, Zhang J (2020b) A novel method for malware detection on ML-based visualization technique. Comput Secur 89:101682CrossRef
Zurück zum Zitat Liu X et al (2021) Privacy and security issues in deep learning: a survey. IEEE Access 9:4566–4593CrossRef Liu X et al (2021) Privacy and security issues in deep learning: a survey. IEEE Access 9:4566–4593CrossRef
Zurück zum Zitat Lobato AGP, Lopez MA, Sanz IJ, Cardenas AA, Duarte, OCM, Pujolle G (2018) An adaptive real-time architecture for zero-day threat detection. In: IEEE international conference on communications (ICC), pp 1–6 Lobato AGP, Lopez MA, Sanz IJ, Cardenas AA, Duarte, OCM, Pujolle G (2018) An adaptive real-time architecture for zero-day threat detection. In: IEEE international conference on communications (ICC), pp 1–6
Zurück zum Zitat Lohstroh M (2017) Why the equifax breach should not have mattered Lohstroh M (2017) Why the equifax breach should not have mattered
Zurück zum Zitat Lotfollahi M, Siavoshani MJ, Zade RSH, Saberian M (2017) Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput 24:1999–2012CrossRef Lotfollahi M, Siavoshani MJ, Zade RSH, Saberian M (2017) Deep packet: a novel approach for encrypted traffic classification using deep learning. Soft Comput 24:1999–2012CrossRef
Zurück zum Zitat Lu Y, Huang X, Ma Y, Ma M (2018a) A weighted context graph model for fast data leak detection. In: IEEE international conference on communications (ICC), pp 1–6 Lu Y, Huang X, Ma Y, Ma M (2018a) A weighted context graph model for fast data leak detection. In: IEEE international conference on communications (ICC), pp 1–6
Zurück zum Zitat Lu X, Wan X, Xiao L, Tang Y, Zhuang W (2018b) Learning-based rogue edge detection in VANETs with ambient radio signals. In: IEEE international conference on communications (ICC), pp 1–6 Lu X, Wan X, Xiao L, Tang Y, Zhuang W (2018b) Learning-based rogue edge detection in VANETs with ambient radio signals. In: IEEE international conference on communications (ICC), pp 1–6
Zurück zum Zitat Mahfouz AM, Venugopal D, Shiva SG (2020) Comparative analysis of ML classifiers for network intrusion detection. In: 4th international congress on information and communication technology, pp 193–207 Mahfouz AM, Venugopal D, Shiva SG (2020) Comparative analysis of ML classifiers for network intrusion detection. In: 4th international congress on information and communication technology, pp 193–207
Zurück zum Zitat Mao Q, Hu F, Hao Q (2018) Deep learning for intelligent wireless networks: a comprehensive survey. IEEE Commun Surv Tutor 20(4):2595–2621CrossRef Mao Q, Hu F, Hao Q (2018) Deep learning for intelligent wireless networks: a comprehensive survey. IEEE Commun Surv Tutor 20(4):2595–2621CrossRef
Zurück zum Zitat Martín ML, Carro B, Sánchez-Esguevillas AJ, Mauri JL (2017) Conditional variational auto-encoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 112:2372–2381 Martín ML, Carro B, Sánchez-Esguevillas AJ, Mauri JL (2017) Conditional variational auto-encoder for prediction and feature recovery applied to intrusion detection in IoT. Sensors 112:2372–2381
Zurück zum Zitat Martinelli F, Marulli F, Mercaldo F (2017) Evaluating convolutional neural network for effective mobile malware detection. Procedia Comput Sci 112:2372–2381CrossRef Martinelli F, Marulli F, Mercaldo F (2017) Evaluating convolutional neural network for effective mobile malware detection. Procedia Comput Sci 112:2372–2381CrossRef
Zurück zum Zitat McLaughlin N, Martinez del Rincon J, Kang B, Yerima S, Miller P, Sezer S, Safaei Y, Trickel E, Zhao Z, Doupé A, Joon Ahn G (2017) Deep android malware detection. In: Proceedings of the seventh ACM on data and application security and privacy, New York, NY, USA, pp 301–308 McLaughlin N, Martinez del Rincon J, Kang B, Yerima S, Miller P, Sezer S, Safaei Y, Trickel E, Zhao Z, Doupé A, Joon Ahn G (2017) Deep android malware detection. In: Proceedings of the seventh ACM on data and application security and privacy, New York, NY, USA, pp 301–308
Zurück zum Zitat Mizuno S, Hatada M, Mori T, Goto S (2017) Botdetector: a robust and scalable approach toward detecting malware-infected devices. In: IEEE international conference on communications (ICC), pp 1–7 Mizuno S, Hatada M, Mori T, Goto S (2017) Botdetector: a robust and scalable approach toward detecting malware-infected devices. In: IEEE international conference on communications (ICC), pp 1–7
Zurück zum Zitat Moore AW, Atkeson CG (1993) Prioritized sweeping: reinforcement learning with less data and less time. Mach Learn 13(1):103–130 Moore AW, Atkeson CG (1993) Prioritized sweeping: reinforcement learning with less data and less time. Mach Learn 13(1):103–130
Zurück zum Zitat Narudin FA, Feizollah A, Anuar NB, Gani A (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Comput 20(1):343–357CrossRef Narudin FA, Feizollah A, Anuar NB, Gani A (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Comput 20(1):343–357CrossRef
Zurück zum Zitat Natalya VM (2019) Computer games to fill the gap in learning functional lexis at russian colleges and universities. In: International conference on quality management, transport and information security, information technologies, pp 639–643 Natalya VM (2019) Computer games to fill the gap in learning functional lexis at russian colleges and universities. In: International conference on quality management, transport and information security, information technologies, pp 639–643
Zurück zum Zitat Ni J, Zhang K, Vasilakos AV (2021) Security and privacy for mobile edge caching: challenges and solutions. IEEE Wirel Commun 28(3):77–83CrossRef Ni J, Zhang K, Vasilakos AV (2021) Security and privacy for mobile edge caching: challenges and solutions. IEEE Wirel Commun 28(3):77–83CrossRef
Zurück zum Zitat Otoum S, Kantarci B, Mouftah HT (2019) On the feasibility of deep learning in sensor network intrusion detection. IEEE Netw Lett 1(2):68–71CrossRef Otoum S, Kantarci B, Mouftah HT (2019) On the feasibility of deep learning in sensor network intrusion detection. IEEE Netw Lett 1(2):68–71CrossRef
Zurück zum Zitat Oulehla M, Oplatková ZK, Malanik D (2016) Detection of mobile botnets using neural networks. In: Future technologies conference (FTC), pp 1324–1326 Oulehla M, Oplatková ZK, Malanik D (2016) Detection of mobile botnets using neural networks. In: Future technologies conference (FTC), pp 1324–1326
Zurück zum Zitat Ozcelik H (2020) An analysis of fraudulent financial reporting using the fraud diamond theory perspective: an empirical study on the manufacturing sector companies listed on the Borsa Istanbul. In: Grima S, Boztepe E, Baldacchino PJ (eds) Contemporary issues in audit management and forensic accounting. Emerald Publishing Limited Ozcelik H (2020) An analysis of fraudulent financial reporting using the fraud diamond theory perspective: an empirical study on the manufacturing sector companies listed on the Borsa Istanbul. In: Grima S, Boztepe E, Baldacchino PJ (eds) Contemporary issues in audit management and forensic accounting. Emerald Publishing Limited
Zurück zum Zitat Pan F, Wen H, Liao R, Jiang Y, Xu A, Ouyang K, Zhu X (2017) Physical layer authentication based on channel information and machine learning. In: IEEE conference on communications and network security (CNS), pp 364–365 Pan F, Wen H, Liao R, Jiang Y, Xu A, Ouyang K, Zhu X (2017) Physical layer authentication based on channel information and machine learning. In: IEEE conference on communications and network security (CNS), pp 364–365
Zurück zum Zitat Patel A, Tailor J (2020) A malicious activity monitoring mechanism to detect and prevent ransomware. Comput Fraud Secur 2020(1):14–19CrossRef Patel A, Tailor J (2020) A malicious activity monitoring mechanism to detect and prevent ransomware. Comput Fraud Secur 2020(1):14–19CrossRef
Zurück zum Zitat Pei C, Zhang N, Shen XS, Mark JW (2014) Channel-based physical layer authentication. In: IEEE global communications conference, pp 4114–4119 Pei C, Zhang N, Shen XS, Mark JW (2014) Channel-based physical layer authentication. In: IEEE global communications conference, pp 4114–4119
Zurück zum Zitat Pihur UV, Korolova A (2014) Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the conference on computer and communications security. ACM, pp 1054–1067 Pihur UV, Korolova A (2014) Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the conference on computer and communications security. ACM, pp 1054–1067
Zurück zum Zitat Prasad R, Rohokale V (eds) (2020) Artificial intelligence and machine learning in cyber security. In: Cyber security: the lifeline of information and communication technology. Springer, pp 231–247 Prasad R, Rohokale V (eds) (2020) Artificial intelligence and machine learning in cyber security. In: Cyber security: the lifeline of information and communication technology. Springer, pp 231–247
Zurück zum Zitat Rath M, Mishra S (2020) Security approaches in machine learning for satellite communication. Springer, Berlin, pp 189–204 Rath M, Mishra S (2020) Security approaches in machine learning for satellite communication. Springer, Berlin, pp 189–204
Zurück zum Zitat Rehman S, Tu S, Waqas M, Huang Y, Rehman O, Ahmad B, Ahmad S (2019) Unsupervised pre-trained filter learning approach for efficient convolution neural networks. Neurocomputing 365:171–190CrossRef Rehman S, Tu S, Waqas M, Huang Y, Rehman O, Ahmad B, Ahmad S (2019) Unsupervised pre-trained filter learning approach for efficient convolution neural networks. Neurocomputing 365:171–190CrossRef
Zurück zum Zitat Ricci J, Breitinger F, Baggili I (2019) Survey results on adults and cybersecurity education. Educ Inf Technol 24(1):231–249CrossRef Ricci J, Breitinger F, Baggili I (2019) Survey results on adults and cybersecurity education. Educ Inf Technol 24(1):231–249CrossRef
Zurück zum Zitat Rodríguez-Gómez RA, Maciá-Fernández G, García-Teodoro P (2013) Survey and taxonomy of botnet research through life-cycle. ACM Comput Surv 45(4):45:1-45:33CrossRef Rodríguez-Gómez RA, Maciá-Fernández G, García-Teodoro P (2013) Survey and taxonomy of botnet research through life-cycle. ACM Comput Surv 45(4):45:1-45:33CrossRef
Zurück zum Zitat Roel M (2012) Physically unclonable functions: constructions, properties and applications. Katholieke Universiteit Leuven, BelgiumMATH Roel M (2012) Physically unclonable functions: constructions, properties and applications. Katholieke Universiteit Leuven, BelgiumMATH
Zurück zum Zitat Sagduyu YE, Shi Y, Erpek T, Headley W, Flowers B, Stantchev G, Lu Z (2020) When wireless security meets machine learning: motivation, challenges, and research directions. arXiv preprint arXiv:2001.08883 Sagduyu YE, Shi Y, Erpek T, Headley W, Flowers B, Stantchev G, Lu Z (2020) When wireless security meets machine learning: motivation, challenges, and research directions. arXiv preprint arXiv:2001.08883
Zurück zum Zitat Saied A, Overill RE, Radzik T (2016) Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172:385–393CrossRef Saied A, Overill RE, Radzik T (2016) Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 172:385–393CrossRef
Zurück zum Zitat Shakiba-Herfeh M, Chorti A, Poor HV (2020) Physical layer security: authentication, integrity and confidentiality. arXiv:2001.07153 Shakiba-Herfeh M, Chorti A, Poor HV (2020) Physical layer security: authentication, integrity and confidentiality. arXiv:2001.07153
Zurück zum Zitat Sharmeen S, Ahmed YA, Huda S, Koçer B, Hassan MM (2020) Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches. IEEE Access 8:24522–24534 Sharmeen S, Ahmed YA, Huda S, Koçer B, Hassan MM (2020) Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches. IEEE Access 8:24522–24534
Zurück zum Zitat Singar AV, Akhilesh K (2020) Role of cyber-security in higher education. In: Akhilesh KB, Möller DPF (eds) Smart technologies. Springer, pp 249–264 Singar AV, Akhilesh K (2020) Role of cyber-security in higher education. In: Akhilesh KB, Möller DPF (eds) Smart technologies. Springer, pp 249–264
Zurück zum Zitat Siponen M, Puhakainen P, Vance A (2020) Can individuals’ neutralization techniques be overcome? A field experiment on password policy. Comput Secur 88:101617CrossRef Siponen M, Puhakainen P, Vance A (2020) Can individuals’ neutralization techniques be overcome? A field experiment on password policy. Comput Secur 88:101617CrossRef
Zurück zum Zitat Smith SS (2020) Cybersecurity & insurance. In: Blockchain, artificial intelligence and financial services. Springer, Berlin, pp 193–200 Smith SS (2020) Cybersecurity & insurance. In: Blockchain, artificial intelligence and financial services. Springer, Berlin, pp 193–200
Zurück zum Zitat Srinivas TAS, Somula R, Govinda K (2020) Privacy and security in Aadhaar. In: Howlett R, Jain LC (eds) Smart intelligent computing and applications. Springer, Berlin, pp 405–410 Srinivas TAS, Somula R, Govinda K (2020) Privacy and security in Aadhaar. In: Howlett R, Jain LC (eds) Smart intelligent computing and applications. Springer, Berlin, pp 405–410
Zurück zum Zitat Steward D, Cavazos R (2019) Big data analytics in us courts: uses, challenges, and implications. Springer Nature, BerlinCrossRef Steward D, Cavazos R (2019) Big data analytics in us courts: uses, challenges, and implications. Springer Nature, BerlinCrossRef
Zurück zum Zitat Su X, Zhang D, Li W, Zhao K (2016) A deep learning approach to android malware feature learning and detection. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp 244–251 Su X, Zhang D, Li W, Zhao K (2016) A deep learning approach to android malware feature learning and detection. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp 244–251
Zurück zum Zitat Sun Y, Yen GG, Yi Z (2018) Evolving unsupervised deep neural networks for learning meaningful representations. IEEE Trans Evol Comput 23(1):89–103CrossRef Sun Y, Yen GG, Yi Z (2018) Evolving unsupervised deep neural networks for learning meaningful representations. IEEE Trans Evol Comput 23(1):89–103CrossRef
Zurück zum Zitat Sutton RS, Barto AG (1998) Introduction to reinforcement learning, vol 135. MIT Press, Cambridge Sutton RS, Barto AG (1998) Introduction to reinforcement learning, vol 135. MIT Press, Cambridge
Zurück zum Zitat Taheri R, Ghahramani M, Javidan R, Shojafar M, Pooranian Z, Conti M (2020) Similarity-based android malware detection using Hamming distance of static binary features. Future Gener Comput Syst 105:230–247CrossRef Taheri R, Ghahramani M, Javidan R, Shojafar M, Pooranian Z, Conti M (2020) Similarity-based android malware detection using Hamming distance of static binary features. Future Gener Comput Syst 105:230–247CrossRef
Zurück zum Zitat Tam K, Feizollah A, Anuar NB, Salleh R, Cavallaro L (2017) The evolution of android malware and android analysis techniques. ACM Comput Surv 49(4):76:1-76:41CrossRef Tam K, Feizollah A, Anuar NB, Salleh R, Cavallaro L (2017) The evolution of android malware and android analysis techniques. ACM Comput Surv 49(4):76:1-76:41CrossRef
Zurück zum Zitat Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software defined networking. In: International conference on wireless networks and mobile communications (WINCOM), pp 258–263 Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software defined networking. In: International conference on wireless networks and mobile communications (WINCOM), pp 258–263
Zurück zum Zitat Tanveer M, Abbas G, Abbas ZH, Waqas M, Muhammad F, Kim S (2020) S6AE: securing 6LoWPAN using authenticated encryption scheme. Sensors 20(9):2707CrossRef Tanveer M, Abbas G, Abbas ZH, Waqas M, Muhammad F, Kim S (2020) S6AE: securing 6LoWPAN using authenticated encryption scheme. Sensors 20(9):2707CrossRef
Zurück zum Zitat Tello-Oquendo L, Pacheco-Paramo D, Pla V, Martinez-Bauset J (2018) Reinforcement learning-based ACB in LTE-A networks for handling massive M2M and H2H communications. In: IEEE international conference on communications (ICC), pp 1–7 Tello-Oquendo L, Pacheco-Paramo D, Pla V, Martinez-Bauset J (2018) Reinforcement learning-based ACB in LTE-A networks for handling massive M2M and H2H communications. In: IEEE international conference on communications (ICC), pp 1–7
Zurück zum Zitat Thing VLL (2017) IEEE 802.11 network anomaly detection and attack classification: a deep learning approach. In: 2017 IEEE wireless communications and networking conference (WCNC), pp 1–6 Thing VLL (2017) IEEE 802.11 network anomaly detection and attack classification: a deep learning approach. In: 2017 IEEE wireless communications and networking conference (WCNC), pp 1–6
Zurück zum Zitat Thomas T, Vijayaraghavan AP, Emmanuel S (2020) Adversarial machine learning in cybersecurity. In: Machine learning approaches in cybersecurity analytics. Springer, Berlin, pp 185–200 Thomas T, Vijayaraghavan AP, Emmanuel S (2020) Adversarial machine learning in cybersecurity. In: Machine learning approaches in cybersecurity analytics. Springer, Berlin, pp 185–200
Zurück zum Zitat Tomasin S (2018) Analysis of channel-based user authentication by key-less and key-based approaches. IEEE Trans Wirel Commun 17(9):5700–5712CrossRef Tomasin S (2018) Analysis of channel-based user authentication by key-less and key-based approaches. IEEE Trans Wirel Commun 17(9):5700–5712CrossRef
Zurück zum Zitat Torres P, Catania C, Garcia S, Garino CG (2016) An analysis of recurrent neural networks for botnet detection behavior. In: IEEE Biennial Congress of Argentina (ARGENCON), pp 1–6 Torres P, Catania C, Garcia S, Garino CG (2016) An analysis of recurrent neural networks for botnet detection behavior. In: IEEE Biennial Congress of Argentina (ARGENCON), pp 1–6
Zurück zum Zitat Tu S, Liu M, Waqas M, Rehman S, Zhu R, Liu L (2018a) FHC-PCIA: a physical cell identification allocation method based on fuzzy hierarchical clustering for heterogeneous cellular network. IEEE Access 6:46976–46987 Tu S, Liu M, Waqas M, Rehman S, Zhu R, Liu L (2018a) FHC-PCIA: a physical cell identification allocation method based on fuzzy hierarchical clustering for heterogeneous cellular network. IEEE Access 6:46976–46987
Zurück zum Zitat Tu S, Huang X, Huang Y, Waqas M, Rehman SU (2018b) SSLSS: semi-supervised learning-based steganalysis scheme for instant voice communication network. IEEE Access 6:66 153-66 164 Tu S, Huang X, Huang Y, Waqas M, Rehman SU (2018b) SSLSS: semi-supervised learning-based steganalysis scheme for instant voice communication network. IEEE Access 6:66 153-66 164
Zurück zum Zitat Tu S, Waqas M, Rehman SU, Aamir M, Rehman OU, Jianbiao Z, Chang C-C (2018c) Security in fog computing: a novel technique to tackle an impersonation attack. IEEE Access 6:74 993-75 001 Tu S, Waqas M, Rehman SU, Aamir M, Rehman OU, Jianbiao Z, Chang C-C (2018c) Security in fog computing: a novel technique to tackle an impersonation attack. IEEE Access 6:74 993-75 001
Zurück zum Zitat Tu S, Waqas M, Meng Y, Rehman S, Ahmad I, Koubaa A, Halim Z, Hanif M, Chang CC, Shi C (2020a) Mobile fog computing security: a user-oriented smart attack defense strategy based on DQL. Comput Commun 160:790–798 Tu S, Waqas M, Meng Y, Rehman S, Ahmad I, Koubaa A, Halim Z, Hanif M, Chang CC, Shi C (2020a) Mobile fog computing security: a user-oriented smart attack defense strategy based on DQL. Comput Commun 160:790–798
Zurück zum Zitat Tu S, Rehman S, Waqas M, Rehman O, Yang Z, Ahmad B, Halim Z, Zhao W (2020b) Optimisation-based training of evolutionary convolution neural network for visual classification applications. IET Comput Vis 14(5):259–267 Tu S, Rehman S, Waqas M, Rehman O, Yang Z, Ahmad B, Halim Z, Zhao W (2020b) Optimisation-based training of evolutionary convolution neural network for visual classification applications. IET Comput Vis 14(5):259–267
Zurück zum Zitat Tu S et al (2021) Reinforcement learning assisted impersonation attack detection in device-to-device communications. IEEE Trans Veh Technol 70(2):1474–1479CrossRef Tu S et al (2021) Reinforcement learning assisted impersonation attack detection in device-to-device communications. IEEE Trans Veh Technol 70(2):1474–1479CrossRef
Zurück zum Zitat Tugnait JK (2013) Wireless user authentication via comparison of power spectral densities. IEEE J Sel Areas Commun 31(9):1791–1802CrossRef Tugnait JK (2013) Wireless user authentication via comparison of power spectral densities. IEEE J Sel Areas Commun 31(9):1791–1802CrossRef
Zurück zum Zitat Valdeón RA (2019) Ad hoc corpora and journalistic translation research: BBC News and BBC Mundo’s coverage of Margaret Thatcher’s death and funeral. Across Lang Cult 20(1):79–95CrossRef Valdeón RA (2019) Ad hoc corpora and journalistic translation research: BBC News and BBC Mundo’s coverage of Margaret Thatcher’s death and funeral. Across Lang Cult 20(1):79–95CrossRef
Zurück zum Zitat Viganò E, Loi M, Yaghmaei E (2020) Cybersecurity of critical infrastructure. In: Christen M, Gordijn B, Loi M (eds) The ethics of cybersecurity. The international library of ethics, law and technology, vol 21. Springer, Cham Viganò E, Loi M, Yaghmaei E (2020) Cybersecurity of critical infrastructure. In: Christen M, Gordijn B, Loi M (eds) The ethics of cybersecurity. The international library of ethics, law and technology, vol 21. Springer, Cham
Zurück zum Zitat Wan X, Xiao L, Li Q, Han Z (2017) Fhy-layer authentication with multiple landmarks with reduced communication overhead. In: IEEE international conference on communications (ICC), pp 1–6 Wan X, Xiao L, Li Q, Han Z (2017) Fhy-layer authentication with multiple landmarks with reduced communication overhead. In: IEEE international conference on communications (ICC), pp 1–6
Zurück zum Zitat Wang Z (2015) The applications of deep learning on traffic identification, BlackHat USA, vol 24 Wang Z (2015) The applications of deep learning on traffic identification, BlackHat USA, vol 24
Zurück zum Zitat Wang H, Yeung DY (2016) Towards Bayesian deep learning: a framework and some existing methods. IEEE Trans Knowl Data Eng 28(12):3395–3408CrossRef Wang H, Yeung DY (2016) Towards Bayesian deep learning: a framework and some existing methods. IEEE Trans Knowl Data Eng 28(12):3395–3408CrossRef
Zurück zum Zitat Wang N, Jiang T, Lv S, Xiao L (2017) Physical-layer authentication based on extreme learning machine. IEEE Commun Lett 21(7):1557–1560CrossRef Wang N, Jiang T, Lv S, Xiao L (2017) Physical-layer authentication based on extreme learning machine. IEEE Commun Lett 21(7):1557–1560CrossRef
Zurück zum Zitat Waqas M, Zeng M, Li Y (2017) Mobility-assisted device-to-device communications for content transmission. In: 13th international wireless communications and mobile computing conference (IWCMC), pp 206–211 Waqas M, Zeng M, Li Y (2017) Mobility-assisted device-to-device communications for content transmission. In: 13th international wireless communications and mobile computing conference (IWCMC), pp 206–211
Zurück zum Zitat Waqas M, Ahmed M, Li Y, Jin D, Chen S (2018a) Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays. IEEE Trans Wirel Commun 17(6):3918–3930 Waqas M, Ahmed M, Li Y, Jin D, Chen S (2018a) Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays. IEEE Trans Wirel Commun 17(6):3918–3930
Zurück zum Zitat Waqas M, Niu Y, Ahmed M, Li Y, Jin D, Han Z (2018b) Mobility-aware fog computing in dynamic environments: understandings and implementation. IEEE Access 7:38867–38879 Waqas M, Niu Y, Ahmed M, Li Y, Jin D, Han Z (2018b) Mobility-aware fog computing in dynamic environments: understandings and implementation. IEEE Access 7:38867–38879
Zurück zum Zitat Waqas M, Zeng M, Li Y, Jin D, Han Z (2018c) Mobility assisted content transmission for device-to-device communication underlaying cellular networks. IEEE Trans Veh Technol 67(7):6410–6423 Waqas M, Zeng M, Li Y, Jin D, Han Z (2018c) Mobility assisted content transmission for device-to-device communication underlaying cellular networks. IEEE Trans Veh Technol 67(7):6410–6423
Zurück zum Zitat Waqas M, Ahmed M, Zhang J, Li Y (2018d) Confidential information ensurance through physical layer security in device-to-device communication. In: IEEE global communications conference (GLOBECOM), pp 1–7 Waqas M, Ahmed M, Zhang J, Li Y (2018d) Confidential information ensurance through physical layer security in device-to-device communication. In: IEEE global communications conference (GLOBECOM), pp 1–7
Zurück zum Zitat Waqas M, Niu Y, Li Y, Ahmed M, Jin D, Chen S, Han Z (2020a) A comprehensive survey on mobility-aware D2D communications: principles, practice and challenges. IEEE Commun Surv Tutor 22(3):1863–1886 Waqas M, Niu Y, Li Y, Ahmed M, Jin D, Chen S, Han Z (2020a) A comprehensive survey on mobility-aware D2D communications: principles, practice and challenges. IEEE Commun Surv Tutor 22(3):1863–1886
Zurück zum Zitat Waqas M, Tu S, Rehman S, Halim Z, Anwar S, Abbas G, Abbas ZH (2020b) Authentication of vehicles and road side units in intelligent transportation system. Comput Mater Contin: CMC 64(1):359–371 Waqas M, Tu S, Rehman S, Halim Z, Anwar S, Abbas G, Abbas ZH (2020b) Authentication of vehicles and road side units in intelligent transportation system. Comput Mater Contin: CMC 64(1):359–371
Zurück zum Zitat Weinand A, Karrenbauer M, Sattiraju R, Schotten H (2017) Application of machine learning for channel based message authentication in mission critical machine type communication. In: European wireless; 23th European wireless conference, pp 1–5 Weinand A, Karrenbauer M, Sattiraju R, Schotten H (2017) Application of machine learning for channel based message authentication in mission critical machine type communication. In: European wireless; 23th European wireless conference, pp 1–5
Zurück zum Zitat Winfield A (2019) Ethical standards in robotics and AI. Nat Electron 2(2):46CrossRef Winfield A (2019) Ethical standards in robotics and AI. Nat Electron 2(2):46CrossRef
Zurück zum Zitat Wu P, Guo H, Moustafa N (2020) Pelican: a deep residual network for network intrusion detection. In: 50th annual IEEE/IFIP international conference on dependable systems and networks workshops (DSN-W), pp 55–62 Wu P, Guo H, Moustafa N (2020) Pelican: a deep residual network for network intrusion detection. In: 50th annual IEEE/IFIP international conference on dependable systems and networks workshops (DSN-W), pp 55–62
Zurück zum Zitat Xiao L, Greenstein L, Mandayam N, Trappe W (2007) Fingerprints in the ether: using the physical layer for wireless authentication. In: IEEE international conference on communications, pp 4646–4651 Xiao L, Greenstein L, Mandayam N, Trappe W (2007) Fingerprints in the ether: using the physical layer for wireless authentication. In: IEEE international conference on communications, pp 4646–4651
Zurück zum Zitat Xiao L, Li Y, Liu G, Li Q, Zhuang W (2015) Spoofing detection with reinforcement learning in wireless networks. In: IEEE global communications conference (GLOBECOM), pp 1–5 Xiao L, Li Y, Liu G, Li Q, Zhuang W (2015) Spoofing detection with reinforcement learning in wireless networks. In: IEEE global communications conference (GLOBECOM), pp 1–5
Zurück zum Zitat Xiao L, Li Y, Han G, Liu G, Zhuang W (2016a) PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Trans Veh Technol 65(12):10037–10047 Xiao L, Li Y, Han G, Liu G, Zhuang W (2016a) PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Trans Veh Technol 65(12):10037–10047
Zurück zum Zitat Xiao L, Chen T, Han G, Zhuang W, Sun L (2016b) Channel-based authentication game in MIMO systems. In: IEEE global communications conference (GLOBECOM), pp 1–6 Xiao L, Chen T, Han G, Zhuang W, Sun L (2016b) Channel-based authentication game in MIMO systems. In: IEEE global communications conference (GLOBECOM), pp 1–6
Zurück zum Zitat Xiao L, Chen T, Han G, Zhuang W, Sun L (2017) Game theoretic study on channel-based authentication in MIMO systems. IEEE Trans Veh Technol 66(8):7474–7484CrossRef Xiao L, Chen T, Han G, Zhuang W, Sun L (2017) Game theoretic study on channel-based authentication in MIMO systems. IEEE Trans Veh Technol 66(8):7474–7484CrossRef
Zurück zum Zitat Xiao L, Wan X, Han Z (2018a) Phy-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun 17(3):1676–1687 Xiao L, Wan X, Han Z (2018a) Phy-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun 17(3):1676–1687
Zurück zum Zitat Xiao L, Li Y, Dai C, Dai H, Poor HV (2018b) Reinforcement learning-based NOME power allocation in the presence of smart jamming. IEEE Trans Veh Technol 67(4):3377–3389 Xiao L, Li Y, Dai C, Dai H, Poor HV (2018b) Reinforcement learning-based NOME power allocation in the presence of smart jamming. IEEE Trans Veh Technol 67(4):3377–3389
Zurück zum Zitat Xiao L, Wan X, Su W, Tang Y (2018c) Anti-jamming underwater transmission with mobility and learning. IEEE Commun Lett 22(3):542–545 Xiao L, Wan X, Su W, Tang Y (2018c) Anti-jamming underwater transmission with mobility and learning. IEEE Commun Lett 22(3):542–545
Zurück zum Zitat Xiao L, Jiang D, Xu D, Zhu H, Zhang Y, Poor HV (2018d) Two-dimensional anti-jamming mobile communication based on reinforcement learning. IEEE Trans Veh Technol 67(10):9499–9512 Xiao L, Jiang D, Xu D, Zhu H, Zhang Y, Poor HV (2018d) Two-dimensional anti-jamming mobile communication based on reinforcement learning. IEEE Trans Veh Technol 67(10):9499–9512
Zurück zum Zitat Xiao L, Zhuang W, Zhou S, Chen C (2019) Learning-based rogue edge detection in VANETs with ambient radio signals. In: Shen XS (ed) Learning-based VANET communication and security techniques. Springer, pp 13–47 Xiao L, Zhuang W, Zhou S, Chen C (2019) Learning-based rogue edge detection in VANETs with ambient radio signals. In: Shen XS (ed) Learning-based VANET communication and security techniques. Springer, pp 13–47
Zurück zum Zitat Xu Z, Liu W, Huang J, Yang C, Lu J, Tan H (2020) Artificial intelligence for securing IoT services in edge computing: a survey. Secur Commun Netw 2020:8872586 Xu Z, Liu W, Huang J, Yang C, Lu J, Tan H (2020) Artificial intelligence for securing IoT services in edge computing: a survey. Secur Commun Netw 2020:8872586
Zurück zum Zitat Yang L, Lau L, Gan H (2020) Investors’ perceptions of the cybersecurity risk management reporting framework. Int J Account Inf Manag 28(1):167–183 Yang L, Lau L, Gan H (2020) Investors’ perceptions of the cybersecurity risk management reporting framework. Int J Account Inf Manag 28(1):167–183
Zurück zum Zitat Yousefi-Azar M, Varadharajan V, Hamey L, Tupakula U (May 2017) Autoencoder-based feature learning for cybersecurity applications. In: International joint conference on neural networks (IJCNN), pp 3854–3861 Yousefi-Azar M, Varadharajan V, Hamey L, Tupakula U (May 2017) Autoencoder-based feature learning for cybersecurity applications. In: International joint conference on neural networks (IJCNN), pp 3854–3861
Zurück zum Zitat Yu M-D, Sowell R, Singh A, M’Raïhi D, Devadas S (2012) Performance metrics and empirical results of a PUF cryptographic key generation ASIC. In: IEEE international symposium on hardware-oriented security and trust, pp 108–115 Yu M-D, Sowell R, Singh A, M’Raïhi D, Devadas S (2012) Performance metrics and empirical results of a PUF cryptographic key generation ASIC. In: IEEE international symposium on hardware-oriented security and trust, pp 108–115
Zurück zum Zitat Yuan Z, Lu Y, Wang Z, Xue Y (2014) Droid-sec: deep learning in android malware detection. SIGCOMM Comput Commun Rev 44(4):371–372CrossRef Yuan Z, Lu Y, Wang Z, Xue Y (2014) Droid-sec: deep learning in android malware detection. SIGCOMM Comput Commun Rev 44(4):371–372CrossRef
Zurück zum Zitat Yuan Z, Lu Y, Xue Y (2016) Droiddetector: android malware characterization and detection using deep learning. Tsinghua Sci Technol 21(1):114–123CrossRef Yuan Z, Lu Y, Xue Y (2016) Droiddetector: android malware characterization and detection using deep learning. Tsinghua Sci Technol 21(1):114–123CrossRef
Zurück zum Zitat Yuan S, Li L, Chigan C (2018) Maximum mean discrepancy based secure fusion strategy for robust cooperative spectrum sensing. In: IEEE international conference on communications (ICC), pp 1–6 Yuan S, Li L, Chigan C (2018) Maximum mean discrepancy based secure fusion strategy for robust cooperative spectrum sensing. In: IEEE international conference on communications (ICC), pp 1–6
Zurück zum Zitat Zaidi K, Milojevic MB, Rakocevic V, Nallanathan A, Rajarajan M (2016) Host-based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans Veh Technol 65(8):6703–6714CrossRef Zaidi K, Milojevic MB, Rakocevic V, Nallanathan A, Rajarajan M (2016) Host-based intrusion detection for VANETs: a statistical approach to rogue node detection. IEEE Trans Veh Technol 65(8):6703–6714CrossRef
Zurück zum Zitat Zeng M, Li Y, Zhang K, Waqas M, Jin D (2018) Incentive mechanism design for computation offloading in heterogeneous fog computing: a contract-based approach. In: IEEE international conference on communications (ICC), pp 1–6 Zeng M, Li Y, Zhang K, Waqas M, Jin D (2018) Incentive mechanism design for computation offloading in heterogeneous fog computing: a contract-based approach. In: IEEE international conference on communications (ICC), pp 1–6
Zurück zum Zitat Zhang Z, Ning H, Shi F, Farha F, Xu Y, Xu J, Zhang F, Choo KKR (2021) Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif Intell Rev Zhang Z, Ning H, Shi F, Farha F, Xu Y, Xu J, Zhang F, Choo KKR (2021) Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif Intell Rev
Zurück zum Zitat Zheng Z, Xie S, Dai H-N, Chen W, Chen X, Weng J, Imran M (2020) An overview on smart contracts: challenges, advances and platforms. Future Gener Comput Syst 105:475–491CrossRef Zheng Z, Xie S, Dai H-N, Chen W, Chen X, Weng J, Imran M (2020) An overview on smart contracts: challenges, advances and platforms. Future Gener Comput Syst 105:475–491CrossRef
Zurück zum Zitat Zhou L, Pan S, Wang J, Vasilakos AV (2017a) Machine Learning on big data: opportunities and challenges. Neurocomputing 237:350–361 Zhou L, Pan S, Wang J, Vasilakos AV (2017a) Machine Learning on big data: opportunities and challenges. Neurocomputing 237:350–361
Zurück zum Zitat Zhou T, Cai Z, Xiao B, Chen Y, Xu M (2017b) Detecting rogue AP with the crowd wisdom. In: IEEE 37th international conference on distributed computing systems (ICDCS), pp 2327–2332 Zhou T, Cai Z, Xiao B, Chen Y, Xu M (2017b) Detecting rogue AP with the crowd wisdom. In: IEEE 37th international conference on distributed computing systems (ICDCS), pp 2327–2332
Zurück zum Zitat Zong W, Chow Y-W, Susilo W (2020) Interactive three-dimensional visualization of network intrusion detection data for machine learning. Future Gener Comput Syst 102:292–306CrossRef Zong W, Chow Y-W, Susilo W (2020) Interactive three-dimensional visualization of network intrusion detection data for machine learning. Future Gener Comput Syst 102:292–306CrossRef
Zurück zum Zitat Zou Y, Zhu J, Wang X, Hanzo L (2016) A survey on wireless security: technical challenges, recent advances, and future trends. Proc IEEE 104(9):1727–1765CrossRef Zou Y, Zhu J, Wang X, Hanzo L (2016) A survey on wireless security: technical challenges, recent advances, and future trends. Proc IEEE 104(9):1727–1765CrossRef
Metadaten
Titel
The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges
verfasst von
Muhammad Waqas
Shanshan Tu
Zahid Halim
Sadaqat Ur Rehman
Ghulam Abbas
Ziaul Haq Abbas
Publikationsdatum
04.02.2022
Verlag
Springer Netherlands
Erschienen in
Artificial Intelligence Review / Ausgabe 7/2022
Print ISSN: 0269-2821
Elektronische ISSN: 1573-7462
DOI
https://doi.org/10.1007/s10462-022-10143-2

Weitere Artikel der Ausgabe 7/2022

Artificial Intelligence Review 7/2022 Zur Ausgabe

Premium Partner