12Utilization of Deep Learning Models for Safe Human‐Friendly Computing in Cloud, Fog, and Mobile Edge Networks
Diego M.R. Tudesco1, Anand Deshpande2, Asif A. Laghari3, Abdullah A. Khan4, Ricardo T. Lopes5, R. Jenice Aroma6, Kumudha Raimond7, Lin Teng8, and Asiya Khan9
1Department of Telecommunications, Federal Fluminense University (UFF), Niterói, RJ, Brazil
2Electronics and Communication Engineering, Angadi Institute of Technology and Management, Belagavi, India
3Sindh Madresstul Islam University, Karachi, Sindh, Pakistan
4Research Lab of Artificial Intelligence and Information Security, Faculty of Computing, Science and Information Technology, Benazir Bhutto Shaheed University, Karachi, Sindh, Pakistan
5Federal University of Rio de Janeiro (COPPE/UFRJ), Nuclear Engineering Laboratory (LIN), Rio de Janeiro, RJ, Brazil
6Department of CSE, Karunya Institute of Technology and Sciences, Karunya University, Coimbatore, India
7Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India
8Software College, Shenyang Normal University, Shenyang, China
9School of Engineering, Computing and Mathematics (Faculty of Science and Engineering), University of Plymouth, Plymouth, UK
12.1 Introduction
Significant usage of “artificial intelligence” (AI) (e.g., “machine learning” [ML]) cybersecurity (CS) [1, 2] is over “intrusion detection and prevention systems” (IDPSs) to constantly examine networks [3–6]. IDPSs [7] can spot likely incidents ...
Get Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.