2021
DOI: 10.1016/j.future.2021.07.015
|View full text |Cite
|
Sign up to set email alerts
|

Deep transfer learning framework for the identification of malicious activities to combat cyberattack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The integration of BERT and deep learning in cybersecurity represents a significant advancement in the field. Research topics include deep learning for threat detection, applying complex neural networks to identify cybersecurity threats [39,40]; BERT for natural language processing in cybersecurity, utilizing BERT's capabilities for processing and analyzing text-based data in cybersecurity contexts [41,42]; neural network architectures for malware classification, designing and testing various neural network models for effective malware identification [43]; transfer learning in cybersecurity tasks, applying knowledge gained from one task to another in the cybersecurity domain [44,45]; deep learning models for anomaly detection, using sophisticated algorithms to detect unusual patterns indicative of security threats [46,47]; BERT-based feature extraction, leveraging BERT to extract relevant features from data for cybersecurity applications [48,49,50]; and the use of BERT for understanding malware the comparison of opcode patterns with those of known malware samples is performed using similarity scoring techniques such as cosine similarity or Jaccard index, which quantify the resemblance between the opcode sequence of a given sample and known malware signatures.…”
Section: Applications Of Bert and Deep Learning In Cybersecuritymentioning
confidence: 99%
“…The integration of BERT and deep learning in cybersecurity represents a significant advancement in the field. Research topics include deep learning for threat detection, applying complex neural networks to identify cybersecurity threats [39,40]; BERT for natural language processing in cybersecurity, utilizing BERT's capabilities for processing and analyzing text-based data in cybersecurity contexts [41,42]; neural network architectures for malware classification, designing and testing various neural network models for effective malware identification [43]; transfer learning in cybersecurity tasks, applying knowledge gained from one task to another in the cybersecurity domain [44,45]; deep learning models for anomaly detection, using sophisticated algorithms to detect unusual patterns indicative of security threats [46,47]; BERT-based feature extraction, leveraging BERT to extract relevant features from data for cybersecurity applications [48,49,50]; and the use of BERT for understanding malware the comparison of opcode patterns with those of known malware samples is performed using similarity scoring techniques such as cosine similarity or Jaccard index, which quantify the resemblance between the opcode sequence of a given sample and known malware signatures.…”
Section: Applications Of Bert and Deep Learning In Cybersecuritymentioning
confidence: 99%
“…In addition, residual units increase sensitivity to small changes in local features, further adjusting network weights, and improving training performance. Due to its few parameters and superior performance, ResNet has been widely used in DL in recent years [23,24] (see Figure 7). ResNet networks have different layers of structure, including 18, 34, 50, and 101, with ResNet50 and ResNet101 being the most commonly used types.…”
Section: Fig 6 Flow Chart Of Automatic Inspection Of Construction Qua...mentioning
confidence: 99%
“…Using various graphs, we visualize different patterns and relationships between various features and attributes 51 . This aids in our understanding of the dataset structure.…”
Section: Proposed Modelmentioning
confidence: 99%