![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter
Map** CKC Model Through NLP Modelling for APT Groups Reports
We are seeing a constant increase in the number of cyberattacks with both monetary and political motives behind them. As such it becomes crucial to identify Advanced Persistent Threats (APT) groups for future ...
-
Chapter
A Comparison Between Different Machine Learning Models for IoT Malware Detection
The rapid expansion of IoT devices and their use in business and critical infrastructure has made them vulnerable to threats from hackers and malwares. These malwares pose a serious threat to the availability ...
-
Chapter
Privacy and Security in Smart and Precision Farming: A Bibliometric Analysis
By using IoT in agriculture which is used for remote monitoring and automation bring a new concern about security and privacy, due to facing huge scale of data in its environment. Most studies aim to present n...
-
Chapter
A Bibliometric Analysis on the Application of Deep Learning in Cybersecurity
The power of artificial intelligence especially deep learning algorithms led to use them in variety fields such as speech recognition, image processing, bioinformatics, robotics and even cybersecurity. Most of...