12Utilization of Deep Learning Models for Safe Human‐Friendly Computing in Cloud, Fog, and Mobile Edge Networks

Diego M.R. Tudesco1, Anand Deshpande2, Asif A. Laghari3, Abdullah A. Khan4, Ricardo T. Lopes5, R. Jenice Aroma6, Kumudha Raimond7, Lin Teng8, and Asiya Khan9

1Department of Telecommunications, Federal Fluminense University (UFF), Niterói, RJ, Brazil

2Electronics and Communication Engineering, Angadi Institute of Technology and Management, Belagavi, India

3Sindh Madresstul Islam University, Karachi, Sindh, Pakistan

4Research Lab of Artificial Intelligence and Information Security, Faculty of Computing, Science and Information Technology, Benazir Bhutto Shaheed University, Karachi, Sindh, Pakistan

5Federal University of Rio de Janeiro (COPPE/UFRJ), Nuclear Engineering Laboratory (LIN), Rio de Janeiro, RJ, Brazil

6Department of CSE, Karunya Institute of Technology and Sciences, Karunya University, Coimbatore, India

7Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India

8Software College, Shenyang Normal University, Shenyang, China

9School of Engineering, Computing and Mathematics (Faculty of Science and Engineering), University of Plymouth, Plymouth, UK

12.1 Introduction

Significant usage of “artificial intelligence” (AI) (e.g., “machine learning” [ML]) cybersecurity (CS) [1, 2] is over “intrusion detection and prevention systems” (IDPSs) to constantly examine networks [36]. IDPSs [7] can spot likely incidents ...

Get Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.