Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter

    AI-Enabled Cybersecurity for IoT and Smart City Applications

    AI-driven cybersecurity is crucial to enhancing the resilience of the Internet of Things (IoT) and smart city ecosystems. Due to the dynamic and heterogeneous nature of IoT devices, these interconnected networ...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  2. No Access

    Chapter

    AI for Critical Infrastructure Protection and Resilience

    This chapter explores how artificial intelligence (AI) can be used to enhance the protection and resilience of critical infrastructure. Society is becoming increasingly dependent on interconnected systems, whi...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  3. No Access

    Chapter

    Cybersecurity Background Knowledge: Terminologies, Attack Frameworks, and Security Life Cycle

    This chapter provides a foundational understanding of cybersecurity concepts, including terminologies and attack frameworks like the cyber kill chain and MITRE ATT&CK, as well as the cybersecurity life cycle. ...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  4. No Access

    Chapter

    Detecting Anomalies and Multi-attacks Through Cyber Learning: An Experimental Analysis

    Detecting cyber-anomalies and attacks are becoming a rising concern these days in the domain of cybersecurity. The knowledge of artificial intelligence (AI), particularly the machine learning techniques, can b...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  5. No Access

    Chapter

    Cybersecurity Data Science: Toward Advanced Analytics, Knowledge, and Rule Discovery for Explainable AI Modeling

    In a computing context, cybersecurity technology and operations are constantly changing, and data science is driving the change. Building a data-driven model that extracts patterns in cybersecurity incidents i...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  6. No Access

    Chapter

    AI for Enhancing ICS/OT Cybersecurity

    In today’s industrial environments, advanced technologies have become increasingly integrated, increasing vulnerabilities and risks related to cyber threats. This chapter explores the transformative role of ar...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  7. No Access

    Chapter

    CyberAI: A Comprehensive Summary of AI Variants, Explainable and Responsible AI for Cybersecurity

    The integration of cybersecurity and artificial intelligence (AI), referred to as “CyberAI,” represents a dynamic and transformative landscape. This chapter outlines the diverse landscape of AI variants, as we...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  8. No Access

    Chapter

    Introduction to AI-Driven Cybersecurity and Threat Intelligence

    With the convergence of artificial intelligence (AI) and cybersecurity, a new paradigm has emerged in how we defend against evolving digital threats. This book explores the dynamic landscape of AI-driven cyber...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  9. No Access

    Chapter

    Learning Technologies: Toward Machine Learning and Deep Learning for Cybersecurity

    This chapter explores the transformative landscape of learning technologies, focusing specifically on machine learning and deep learning techniques used in cybersecurity. As digital threats become increasingly...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  10. No Access

    Chapter

    Generative AI and Large Language Modeling in Cybersecurity

    Cybersecurity is encountering new challenges demanding innovative solutions due to the complexity and frequency of cyberattacks progressing. Artificial intelligence (AI), particularly generative AI, has emerge...

    Iqbal H. Sarker in AI-Driven Cybersecurity and Threat Intelligence (2024)

  11. No Access

    Chapter and Conference Paper

    Classifying Sentiments from Movie Reviews Using Deep Neural Networks

    Sentiment analysis has become crucial for the building of opinion mining systems due to the daily creation, sharing, and transfer of massive volumes of data and opinions via the Internet and other media. The s...

    Syed Md. Minhaz Hossain, Jayed Akbar Sumon in Intelligent Computing & Optimization (2023)

  12. No Access

    Chapter and Conference Paper

    Detecting Smishing Attacks Using Feature Extraction and Classification Techniques

    Phishing scams via SMS have become a common phenomenon due to the widespread use of smartphones and the availability of mobile Internet technologies. Identifying a phishing SMS via analyzing unstructured short...

    Rubaiath E. Ulfath, Iqbal H. Sarker in Proceedings of the International Conferenc… (2022)

  13. No Access

    Chapter and Conference Paper

    Automatic Malware Categorization Based on K-Means Clustering Technique

    The android operating system is a popular operating system for mobile phone applications. This is also known as an open-source operating system so that the developers can easily update and add new features to ...

    Nazifa Mosharrat, Iqbal H. Sarker in Proceedings of the International Conferenc… (2022)

  14. No Access

    Chapter and Conference Paper

    Genetic Algorithm-Based Optimal Deep Neural Network for Detecting Network Intrusions

    Computer network attacks are evolving in parallel with the evolution of hardware and neural network architecture. Despite major advancements in network intrusion detection system (NIDS) technology, most implem...

    Sourav Adhikary, Md. Musfique Anwar in Machine Intelligence and Data Science Appl… (2022)

  15. No Access

    Chapter and Conference Paper

    SATLabel: A Framework for Sentiment and Aspect Terms Based Automatic Topic Labelling

    In this paper, we present a framework that automatically labels latent Dirichlet allocation (LDA) generated topics using sentiment and aspect terms from COVID-19 tweets to help the end-users by minimizing the ...

    Khandaker Tayef Shahriar, Mohammad Ali Moni in Machine Intelligence and Data Science Appl… (2022)

  16. No Access

    Chapter and Conference Paper

    Spam Filtering of Mobile SMS Using CNN–LSTM Based Deep Learning Model

    In our civilizations, SMS continues to be an arguable communication tool despite the rattling development of protocol–predicated messaging approaches. Some businesses consider SMS as superior to e-mails for it...

    Syed Md. Minhaz Hossain, Jayed Akbar Sumon, Anik Sen in Hybrid Intelligent Systems (2022)

  17. No Access

    Chapter and Conference Paper

    InterPlanetary File System-Based Decentralized and Secured Electronic Health Record System Using Lightweight Algorithm

    The electronic health record (EHR) system is a cloud-based patient health record in digital format that often includes contact information about the patient, test reports, medical history, and current and prev...

    Sanjida Sharmin, Iqbal H. Sarker in Proceedings of the International Conferenc… (2022)

  18. No Access

    Chapter and Conference Paper

    iMedMS: An IoT Based Intelligent Medication Monitoring System for Elderly Healthcare

    In recent years, the ageing population is growing swiftly and ensuring proper healthcare for the elderly and physically challenged people has gained much attention from academic, medical or industrial experts....

    Khalid Ibn Zinnah Apu, Mohammed Moshiul Hoque in Intelligent Computing & Optimization (2022)

  19. No Access

    Chapter and Conference Paper

    Ransomware Family Classification with Ensemble Model Based on Behavior Analysis

    Ransomware is one of the most dangerous types of malware, which is frequently intended to spread through a network to damage the designated client by encrypting the client’s vulnerable data. Conventional signa...

    Nowshin Tasnim, Khandaker Tayef Shahriar in Machine Intelligence and Data Science Appl… (2022)

  20. No Access

    Chapter

    A Tale of Two Zones: Pandemic ERT Evaluation

    During the COVID-19 pandemic, many educational institutes switched from in-person to all virtual classes. Few educational institutes were well prepared for emergency remote teaching (ERT), whereas many others ...

    Enamul Haque, Tanvir Mahmud in Smart and Sustainable Technology for Resil… (2022)

previous disabled Page of 2