A Survey of Deep Learning Methods for Cyber Security

Clicks: 233
ID: 39502
2019
Article Quality & Performance Metrics
Overall Quality Improving Quality
0.0 /100
Combines engagement data with AI-assessed academic quality
AI Quality Assessment
Not analyzed
Abstract
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neural networks, generative adversarial networks, and several others. Then we discuss how each of the DL methods is used for security applications. We cover a broad array of attack types including malware, spam, insider threats, network intrusions, false data injection, and malicious domain names used by botnets.
Reference Key
berman2019ainformation Use this key to autocite in the manuscript while using SciMatic Manuscript Manager or Thesis Manager
Authors Berman, Daniel S.;Buczak, Anna L.;Chavis, Jeffrey S.;Corbett, Cherita L.;
Journal information
Year 2019
DOI
DOI not found
URL
Keywords Keywords not found

Citations

No citations found. To add a citation, contact the admin at info@scimatic.org

No comments yet. Be the first to comment on this article.