Survey on Applications of Deep Learning and Machine Learning Techniques for Cyber Security
DOI:
https://doi.org/10.3991/ijim.v14i16.16953Keywords:
Machine learning, Deep learning, Cybersecurity, ApplicationsAbstract
The research aimed to conduct an extensive study of machine learning and deep learning methods in cybersecurity. To accomplish the objectives, the research carried out a qualitative study based on secondary data collection to review the available studies and literature. The research has examined three machine learning methods and three deep learning methods to study the most popular techniques used in cybersecurity. During the research, the working mechanism of each method was studied along with their strengths and weaknesses. Also, a comparative discussion has been made to examine the most effective method for cybersecurity. Limitations in the current literature were also identified, and future direction is also given to target and develop the weak areas of machine learning and deep learning methods.
Downloads
Published
How to Cite
Issue
Section
License
The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Attribution Licence (CC-BY What does this mean?). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.
This journal has been awarded the SPARC Europe Seal for Open Access Journals (What's this?)