You are on page 1of 2

1. V.

Ganesan, "Machine Learning in Mobile Applications", International Journal of


Computer Science and Mobile Computing, vol. 11, no. 2, 2022.

2. I. Sarker, M. Hoque, M. Uddin and T. Alsanoosy, "Mobile Data Science and


Intelligent Apps: Concepts AI-Based Modeling and Research Directions", Mobile
Networks and Applications, vol. 26, no. 1, pp. 285-303, 2021.

3. I.H. Sarker, S. Badsha, H. Alqahtani and P. Watters, "Cybersecurity data


science: an overview from machine learning perspective", Journal of Big Data, vol.
7, no. 1, 2021.

4. V. D. Soni, Challenges and Solution for Artificial Intelligence in Cybersecurity


of the USA, 2020.

5. S. Zeadally, E. Adi, Z. Baig and I. A. Khan, "Harnessing Artificial Intelligence


Capabilities to Improve Cybersecurity", IEEE Access, vol. 8, pp. 23817-23837, 2020.

6. J. M. Helm, A. M. Swiergosz, H. S. Haeberle and J. M. Karnuta, "Machine learning


and artificial intelligence: definitions applications and future directions",
Current reviews in musculoskeletal medicine, vol. 13, no. 1, 2020.

7. X. Xu, Q. Liu, X. Zhang, J. Zhang, L. Qi and W. Dou, "A blockchain-powered


crowdsourcing method with privacy preservation in mobile environment", IEEE
Transactions on Computational Social Systems, vol. 6, no. 6, pp. 1407-1419, 2019.

8. Eva Rodriguez, Beatriz Otero, Norma Gutierrez and Ramon Canal, "A Survey of Deep
Learning Techniques for Cybersecurity in Mobile Networks", IEEE Communications
Surveys & Tutorials, vol. 18, no. 2, pp. 1686-1695, 2021.

9. V. D. Soni, Challenges and Solution for Artificial Intelligence in Cybersecurity


of the USA, 2020.

10. I.H. Sarker, S. Badsha, H. Alqahtani and P. Watters, "Cybersecurity data


science: an overview from machine learning perspective", Journal of Big Data, vol.
7, no. 1, 2021.

11. X. Lu, Z. Pan and H. Xian, "An integrity verification scheme of cloud storage
for internet-of-things mobile terminal devices", Comput. Secur., vol. 92, pp.
101686, 2020.

12. E. Hodo, X. Bellekens, A. Hamilton and P. L. Dubouilh, "Threat analysis of IoT


networks using artificial neural network intrusion detection system", Proceedings
of the International Symposium on Networks Computers and Communications (ISNCC),
pp. 1-6, 2017.

13. O. Vermesan, P. Friess and P. Guillemin, "Internet of things strategic research


roadmap", Global Technological and Societal Trends, vol. 1, pp. 9-52, 2012.

14. Paul Ruggiero and Jon Foote, Technical Information Paper: Cyber Threats to
Mobile Devices, 2011.

15. L. Cao, "Data science: a comprehensive overview", ACM. Computing Surveys


(CSUR), vol. 50, no. 3, pp. 43, 2017.

16. J. Kivimaa, A. Ojamaa and E. Tyugu, "Graded security expert system",


International Workshop on Critical Information Infrastructures Security, pp. 279-
286, 2010.
17. Murat Yesilyurt and Yildiray Yalman, "Security Threats on Mobile Devices and
their Effects: Estimations for the Future", International Journal of Security and
Its Applications, vol. 10, no. 2, pp. 13-26, 2016.

18. M. A. Ferrag, L. Maglaras, S. Moschoyiannis and H. Janicke, "Deep learning for


cyber security intrusion detection: approaches datasets and comparative study",
Journal of Information Security and Applications, vol. 50, 2020.

19. S. Zeadally, E. Adi, Z. Baig and I. A. Khan, "Harnessing Artificial


Intelligence Capabilities to Improve Cybersecurity", IEEE Access, vol. 8, pp.
23817-23837, 2020.

20. C. Panchev, P. Dobrev and J. Nicholson, "Detecting port scans against mobile
devices with neural networks and decision trees", International Conference on
Engineering Applications of Neural Networks, pp. 175-182, 2014.

21. "Technical Information Paper", Cyber Threats to Mobile Devices TIP-10–105-01,


2010, [online] Available: http://www.us-cert.gov/readingroom/TIP10–105-01.pdf.

You might also like