Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter
A Comparison Between Different Machine Learning Models for IoT Malware Detection
The rapid expansion of IoT devices and their use in business and critical infrastructure has made them vulnerable to threats from hackers and malwares. These malwares pose a serious threat to the availability ...
-
Chapter
A Bibliometric Analysis on the Application of Deep Learning in Cybersecurity
The power of artificial intelligence especially deep learning algorithms led to use them in variety fields such as speech recognition, image processing, bioinformatics, robotics and even cybersecurity. Most of...