1
|
Chen L, Tao G, Yang M. Machine-learning-based prediction of a diagnostic model using autophagy-related genes based on RNA sequencing for patients with papillary thyroid carcinoma. Open Med (Wars) 2024; 19:20240896. [PMID: 38463514 PMCID: PMC10921443 DOI: 10.1515/med-2024-0896] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/18/2023] [Revised: 12/12/2023] [Accepted: 12/12/2023] [Indexed: 03/12/2024] Open
Abstract
Papillary thyroid carcinoma (PTC) is the most common type of thyroid cancer and belongs to the category of malignant tumors of the thyroid gland. Autophagy plays an important role in PTC. The purpose of this study is to develop a novel diagnostic model using autophagy-related genes (ARGs) in patients. In this study, RNA sequencing data of PTC samples and normal samples were obtained from GSE33630 and GSE29265. Then, we analyzed GSE33630 datasets and identified 127 DE-ARGs. Functional enrichment analysis suggested that 127 DE-ARGs were mainly enriched in pathways in cancer, protein processing in endoplasmic reticulum, toll-like receptor pathway, MAPK pathway, apoptosis, neurotrophin signaling pathway, and regulation of autophagy. Subsequently, CALCOCO2, DAPK1, and RAC1 among the 127 DE-ARGs were identified as diagnostic genes by support vector machine recursive feature elimination and least absolute shrinkage and selection operator algorithms. Then, we developed a novel diagnostic model using CALCOCO2, DAPK1, and RAC1 and its diagnostic value was confirmed in GSE29265 and our cohorts. Importantly, CALCOCO2 may be a critical regulator involved in immune microenvironment because its expression was related to many types of immune cells. Overall, we developed a novel diagnostic model using CALCOCO2, DAPK1, and RAC1 which can be used as diagnostic markers of PTC.
Collapse
Affiliation(s)
- Lin Chen
- Department of Endocrinology and Metabolism, People’s Hospital of Chongqing Liang jiang New Area, Chongqing, China
| | - Gaofeng Tao
- Department of Medicine and Education, People’s Hospital of Chongqing Liang jiang New Area, Chongqing, China
| | - Mei Yang
- Department of Endocrinology and Metabolism, People’s Hospital of Chongqing Liang jiang New Area, Chongqing, China
| |
Collapse
|
2
|
Sharma B, Koundal D, Ramadan RA, Corchado JM. Emerging Sensor Communication Network-Based AI/ML Driven Intelligent IoT. SENSORS (BASEL, SWITZERLAND) 2023; 23:7814. [PMID: 37765871 PMCID: PMC10535476 DOI: 10.3390/s23187814] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/11/2023] [Accepted: 08/30/2023] [Indexed: 09/29/2023]
Abstract
At present, the field of the Internet of Things (IoT) is one of the fastest-growing areas in terms of Artificial Intelligence (AI) and Machine Learning (ML) techniques [...].
Collapse
Affiliation(s)
- Bhisham Sharma
- Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura 140401, Punjab, India
| | - Deepika Koundal
- Department of Computer Science, University of Petroleum & Energy Studies, Dehradun 248007, Uttarakhand, India
| | - Rabie A Ramadan
- Computer Engineering Department, College of Computer Science and Engineering, Hail University, Hail 81481, Saudi Arabia
| | - Juan M Corchado
- BISITE Research Group, Edificio Multiusos I+D+i, University of Salamanca, 37007 Salamanca, Spain
| |
Collapse
|
3
|
Alturki N, Aljrees T, Umer M, Ishaq A, Alsubai S, Saidani O, Djuraev S, Ashraf I. An Intelligent Framework for Cyber-Physical Satellite System and IoT-Aided Aerial Vehicle Security Threat Detection. SENSORS (BASEL, SWITZERLAND) 2023; 23:7154. [PMID: 37631691 PMCID: PMC10457909 DOI: 10.3390/s23167154] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/10/2023] [Revised: 08/02/2023] [Accepted: 08/07/2023] [Indexed: 08/27/2023]
Abstract
The small-drone technology domain is the outcome of a breakthrough in technological advancement for drones. The Internet of Things (IoT) is used by drones to provide inter-location services for navigation. But, due to issues related to their architecture and design, drones are not immune to threats related to security and privacy. Establishing a secure and reliable network is essential to obtaining optimal performance from drones. While small drones offer promising avenues for growth in civil and defense industries, they are prone to attacks on safety, security, and privacy. The current architecture of small drones necessitates modifications to their data transformation and privacy mechanisms to align with domain requirements. This research paper investigates the latest trends in safety, security, and privacy related to drones, and the Internet of Drones (IoD), highlighting the importance of secure drone networks that are impervious to interceptions and intrusions. To mitigate cyber-security threats, the proposed framework incorporates intelligent machine learning models into the design and structure of IoT-aided drones, rendering adaptable and secure technology. Furthermore, in this work, a new dataset is constructed, a merged dataset comprising a drone dataset and two benchmark datasets. The proposed strategy outperforms the previous algorithms and achieves 99.89% accuracy on the drone dataset and 91.64% on the merged dataset. Overall, this intelligent framework gives a potential approach to improving the security and resilience of cyber-physical satellite systems, and IoT-aided aerial vehicle systems, addressing the rising security challenges in an interconnected world.
Collapse
Affiliation(s)
- Nazik Alturki
- Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia; (N.A.); (O.S.)
| | - Turki Aljrees
- College of Computer Science and Engineering, University of Hafr Al-Batin, Hafar Al-Batin 39524, Saudi Arabia;
| | - Muhammad Umer
- Department of Computer Science & Information Technology, The Islamia University of Bahawalpur, Bahawalpur 63100, Pakistan;
| | - Abid Ishaq
- Department of Computer Science & Information Technology, The Islamia University of Bahawalpur, Bahawalpur 63100, Pakistan;
| | - Shtwai Alsubai
- Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, P.O. Box 151, Al-Kharj 11942, Saudi Arabia;
| | - Oumaima Saidani
- Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia; (N.A.); (O.S.)
| | - Sirojiddin Djuraev
- Department of Software Engineering, New Uzbekistan University, Tashkent 100007, Uzbekistan;
| | - Imran Ashraf
- Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea
| |
Collapse
|
4
|
Horalek J, Sobeslav V. Security Baseline for Substation Automation Systems. SENSORS (BASEL, SWITZERLAND) 2023; 23:7125. [PMID: 37631660 PMCID: PMC10458962 DOI: 10.3390/s23167125] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/19/2023] [Revised: 08/08/2023] [Accepted: 08/09/2023] [Indexed: 08/27/2023]
Abstract
The use of information technology and the automation of control systems in the energy sector enables a more efficient transmission and distribution of electricity. However, in addition to the many benefits that the deployment of intelligent and largely autonomous systems brings, it also carries risks associated with information and cyber security breaches. Technology systems form a specific and critical communication infrastructure, in which powerful control elements integrating IoT principles and IED devices are present. It also contains intelligent access control systems such as RTU, IDE, HMI, and SCADA systems that provide communication with the data and control center on the outer perimeter. Therefore, the key question is how to comprehensively protect these specialized systems and how to approach security implementation projects in this area. To establish rules, procedures, and techniques to ensure the cyber security of smart grid control systems in the energy sector, it is necessary to understand the security threats and bring appropriate measures to ensure the security of energy distribution. Given the use of a wide range of information and industrial technologies, it is difficult to protect energy distribution systems using standard constraints to protect common IT technologies and business processes. Therefore, as part of a comprehensive approach to cyber security, specifics such as legislative framework, technological constraints, international standards, specialized protocols or company processes, and many others need to be considered. Therefore, the key question is how to comprehensively protect these specialized systems and how to approach security implementation projects in this area. In this article, a basic security concept for control systems of power stations, which are part of the power transmission and distribution system, is presented based on the Smart Grid domain model with emphasis on substation intelligence, according to the Purdue model. The main contribution of the paper is the comprehensive design of mitigation measures divided into mandatory and recommended implementation based on the standards defined within the MITRE ATT&CK matrix specified, concerning the specifications of intelligent distribution substations. The proposed and industry-tested solution is mapped to meet the international security standards ISO 27001 and national legislation reflecting the requirements of NIS2. This ensures that the security requirements will be met when implementing the proposed Security Baseline.
Collapse
Affiliation(s)
| | - Vladimir Sobeslav
- Department of Information Technologies, Faculty of Informatics and Management, 500 03 Hradec Kralove, Czech Republic;
| |
Collapse
|
5
|
Guan S, Wang Y, Liu L, Gao J, Xu Z, Kan S. Ultra-short-term wind power prediction method combining financial technology feature engineering and XGBoost algorithm. Heliyon 2023; 9:e16938. [PMID: 37484352 PMCID: PMC10361039 DOI: 10.1016/j.heliyon.2023.e16938] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/02/2023] [Revised: 05/30/2023] [Accepted: 06/01/2023] [Indexed: 07/25/2023] Open
Abstract
The input features of existing wind power time-series data prediction models are difficult to indicate the potential relationships between data, and the prediction methods are based on deep learning, which makes the convergence of the models slow and difficult to be applied to the actual production environment. To solve the above problems, an ultra-short-term wind power prediction model based on the XGBoost algorithm combined with financial technical index feature engineering and variational ant colony algorithm is proposed. The model innovatively applies financial technical indicators from financial time series data to wind power time series data and creates a class of model input features that can highly condense the potential relationships between time series data. A bionic algorithm is used to search for the best computational parameters for financial technical indicators to reduce the reliance on financial experts' experience. Taking the German power company Tennet wind power data set as an example, the prediction model proposed in this study has an mean absolute error of 0.859 and a root mean square error of 1.329, and it takes only 244 ms to complete the prediction. Thus, this study provides a new solution for ultra-short-term wind power prediction.
Collapse
Affiliation(s)
- Shijie Guan
- School of Data Science and Application, Inner Mongolia University of Technology, Hohhot 010080, China
- Software Service Engineering Technology Research Center, Inner Mongolia Autonomous Region, Hohhot 010080, China
| | - Yongsheng Wang
- School of Data Science and Application, Inner Mongolia University of Technology, Hohhot 010080, China
- Software Service Engineering Technology Research Center, Inner Mongolia Autonomous Region, Hohhot 010080, China
| | - Limin Liu
- School of Data Science and Application, Inner Mongolia University of Technology, Hohhot 010080, China
- Software Service Engineering Technology Research Center, Inner Mongolia Autonomous Region, Hohhot 010080, China
| | - Jing Gao
- School of Computer and Information, Inner Mongolia Agricultural University, Hohhot 010018, China
| | - Zhiwei Xu
- School of Data Science and Application, Inner Mongolia University of Technology, Hohhot 010080, China
- Software Service Engineering Technology Research Center, Inner Mongolia Autonomous Region, Hohhot 010080, China
| | - Sijia Kan
- School of Natural Sciences, The University of Manchester, Manchester, M13 9PL, UK
| |
Collapse
|
6
|
Mazhar T, Talpur DB, Shloul TA, Ghadi YY, Haq I, Ullah I, Ouahada K, Hamam H. Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence. Brain Sci 2023; 13:brainsci13040683. [PMID: 37190648 DOI: 10.3390/brainsci13040683] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/18/2023] [Revised: 04/02/2023] [Accepted: 04/14/2023] [Indexed: 05/17/2023] Open
Abstract
The Internet of Things (IoT) is a well-known technology that has a significant impact on many areas, including connections, work, healthcare, and the economy. IoT has the potential to improve life in a variety of contexts, from smart cities to classrooms, by automating tasks, increasing output, and decreasing anxiety. Cyberattacks and threats, on the other hand, have a significant impact on intelligent IoT applications. Many traditional techniques for protecting the IoT are now ineffective due to new dangers and vulnerabilities. To keep their security procedures, IoT systems of the future will need AI-efficient machine learning and deep learning. The capabilities of artificial intelligence, particularly machine and deep learning solutions, must be used if the next-generation IoT system is to have a continuously changing and up-to-date security system. IoT security intelligence is examined in this paper from every angle available. An innovative method for protecting IoT devices against a variety of cyberattacks is to use machine learning and deep learning to gain information from raw data. Finally, we discuss relevant research issues and potential next steps considering our findings. This article examines how machine learning and deep learning can be used to detect attack patterns in unstructured data and safeguard IoT devices. We discuss the challenges that researchers face, as well as potential future directions for this research area, considering these findings. Anyone with an interest in the IoT or cybersecurity can use this website's content as a technical resource and reference.
Collapse
Affiliation(s)
- Tehseen Mazhar
- Department of Computer Science, Virtual University, Lahore 55150, Pakistan
| | - Dhani Bux Talpur
- Department of Information and Computing, University of Sufism and Modern Sciences, Bhit Shah 70140, Pakistan
| | - Tamara Al Shloul
- Department of General Education, Liwa College of Technology, Abu Dhabi 15222, United Arab Emirates
| | - Yazeed Yasin Ghadi
- Department of Computer Science, Al Ain University, Abu Dhabi 112612, United Arab Emirates
| | - Inayatul Haq
- School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China
| | - Inam Ullah
- Department of Computer Engineering, Gachon University, Seongnam 13120, Republic of Korea
| | - Khmaies Ouahada
- School of Electrical Engineering, Department of Electrical and Electronic Engineering Science, University of Johannesburg, Johannesburg 2006, South Africa
| | - Habib Hamam
- College of Computer Science and Engineering, University of Ha'il, Ha'il 55476, Saudi Arabia
- International Institute of Technology and Management, Commune d'Akanda, Libreville BP 1989, Gabon
- Faculty of Engineering, Université de Moncton, Moncton, NB E1A3E9, Canada
- Spectrum of Knowledge Production & Skills Development, Sfax 3027, Tunisia
| |
Collapse
|
7
|
Artificial Intelligence for Antimicrobial Resistance Prediction: Challenges and Opportunities towards Practical Implementation. Antibiotics (Basel) 2023; 12:antibiotics12030523. [PMID: 36978390 PMCID: PMC10044311 DOI: 10.3390/antibiotics12030523] [Citation(s) in RCA: 13] [Impact Index Per Article: 13.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/07/2023] [Revised: 03/01/2023] [Accepted: 03/03/2023] [Indexed: 03/08/2023] Open
Abstract
Antimicrobial resistance (AMR) is emerging as a potential threat to many lives worldwide. It is very important to understand and apply effective strategies to counter the impact of AMR and its mutation from a medical treatment point of view. The intersection of artificial intelligence (AI), especially deep learning/machine learning, has led to a new direction in antimicrobial identification. Furthermore, presently, the availability of huge amounts of data from multiple sources has made it more effective to use these artificial intelligence techniques to identify interesting insights into AMR genes such as new genes, mutations, drug identification, conditions favorable to spread, and so on. Therefore, this paper presents a review of state-of-the-art challenges and opportunities. These include interesting input features posing challenges in use, state-of-the-art deep-learning/machine-learning models for robustness and high accuracy, challenges, and prospects to apply these techniques for practical purposes. The paper concludes with the encouragement to apply AI to the AMR sector with the intention of practical diagnosis and treatment, since presently most studies are at early stages with minimal application in the practice of diagnosis and treatment of disease.
Collapse
|
8
|
Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:8803586. [PMID: 36210975 PMCID: PMC9536949 DOI: 10.1155/2022/8803586] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/26/2022] [Revised: 07/04/2022] [Accepted: 07/15/2022] [Indexed: 11/17/2022]
Abstract
The Internet of Things (IoT) ushers in a new era of communication that depends on a broad range of things and many types of communication technologies to share information. This new age of communication will be characterised by the following characteristics: Because all of the IoT's objects are connected to one another and because they function in environments that are not protected, it poses a significantly greater number of issues, constraints, and challenges than do traditional computing systems. This is due to the fact that traditional computing systems do not have as many interconnected components. Because of this, it is imperative that security be prioritised in a new approach, which is not something that is currently present in conventional computer systems. The Wireless Sensor Network, often known as WSN, and the Mobile Ad hoc Network are two technologies that play significant roles in the process of building an Internet of Things system. These technologies are used in a wide variety of activities, including sensing, environmental monitoring, data collecting, heterogeneous communication techniques, and data processing, amongst others. Because it incorporates characteristics of both MANET and WSN, IoT is susceptible to the same kinds of security issues that affect those other networks. An assault known as a Delegate Entity Attack (DEA) is a subclass of an attack known as a Denial of Service (DoS). The attacker sends an unacceptable number of control packets that have the appearance of being authentic. DoS assaults may take many different forms, and one of those kinds is an SD attack. Because of this, it is far more difficult to recognise this form of attack than a simple one that depletes the battery's capacity. One of the other key challenges that arise in a network during an SD attack is that there is the need to enhance energy management and prolong the lifespan of IoT nodes. This is one of the other significant issues that arise in a network when an SD attack is occurs. It is recommended that you make use of a Random Number Generator with Hierarchical Intrusion Detection System, abbreviated as RNGHID for short. The ecosystem of the Internet of Things is likely to be segmented into a great number of separate sectors and clusters. The HIPS system has been partitioned into two entities, which are referred to as the Delegate Entity (DE) and the Pivotal Entity, in order to identify any nodes in the network that are behaving in an abnormal manner. These entities are known, respectively, as the Delegate Entity and the Pivotal Entity (PE). Once the anomalies have been identified, it will be possible to pinpoint the area of the SD attack torture and the damaging activities that have been taken place. A warning message, generated by the Malicious Node Alert System (MNAS), is broadcast across the network in order to inform the other nodes that the network is under attack. This message classifies the various sorts of attacks based on the results of an algorithm that employs machine learning. The proposed protocol displays various desired properties, such as the capacity to conduct indivisible authentication, rapid authentication, and minimum overhead in both transmission and storage. These are only a few of the desirable attributes.
Collapse
|
9
|
Onyema EM, Dalal S, Romero CAT, Seth B, Young P, Wajid MA. Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities. JOURNAL OF CLOUD COMPUTING: ADVANCES, SYSTEMS AND APPLICATIONS 2022. [DOI: 10.1186/s13677-022-00305-6] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022] Open
Abstract
AbstractThe Internet of things (IoT) is an important technology that is highly beneficial in establishing smart items, connections and cities. However, there are worries regarding security and privacy vulnerabilities in IoT in which some emerge from numerous sources, including cyberattacks, unsecured networks, data, connections or communication. This paper provides an ensemble intrusion strategy based on Cyborg Intelligence (machine learning and biological intelligence) framework to boost security of IoT enabled networks utilized for network traffic of smart cities. To do this, multiple algorithms such Random Forest, Bayesian network (BN), C5.0, CART and Artificial Neural Network were investigated to determine their usefulness in identifying threats and attacks-botnets in IoT networks based on cyborg intelligence using the KDDcup99 dataset. The results reveal that the AdaBoost ensemble learning based on Cyborg Intelligence Intrusion Detection framework facilitates dissimilar network characteristics with the capacity to swiftly identify different botnet assaults efficiently. The suggested framework has obtained good accuracy, detection rate and a decreased false positive rate in comparison to other standard methodologies. The conclusion of this study would be a valuable complement to the efforts toward protecting IoT-powered networks and the accomplishment of safer smart cities.
Collapse
|
10
|
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder. FUTURE INTERNET 2022. [DOI: 10.3390/fi14080240] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybrid technique to recognize denial-of-service (DDoS) attacks that combine deep learning and feedforward neural networks as autoencoders. Two datasets were analyzed for the training and testing model, first statically and then iteratively. The auto-encoding model is constructed by stacking the input layer and hidden layer of self-encoding models’ layer by layer, with each self-encoding model using a hidden layer. To evaluate our model, we use a three-part data split (train, test, and validate) rather than the common two-part split (train and test). The resulting proposed model achieved a higher accuracy for the static dataset, where for ISCX-IDS-2012 dataset, accuracy reached a high of 99.35% in training, 99.3% in validation and 99.99% in precision, recall, and F1-score. for the UNSW2018 dataset, the accuracy reached a high of 99.95% in training, 0.99.94% in validation, and 99.99% in precision, recall, and F1-score. In addition, the model achieved great results with a dynamic dataset (using an emulator), reaching a high of 97.68% in accuracy.
Collapse
|
11
|
Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions. SENSORS 2022; 22:s22062194. [PMID: 35336373 PMCID: PMC8952217 DOI: 10.3390/s22062194] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/16/2022] [Revised: 03/06/2022] [Accepted: 03/09/2022] [Indexed: 01/27/2023]
Abstract
With information systems worldwide being attacked daily, analogies from traditional warfare are apt, and deception tactics have historically proven effective as both a strategy and a technique for Defense. Defensive Deception includes thinking like an attacker and determining the best strategy to counter common attack strategies. Defensive Deception tactics are beneficial at introducing uncertainty for adversaries, increasing their learning costs, and, as a result, lowering the likelihood of successful attacks. In cybersecurity, honeypots and honeytokens and camouflaging and moving target defense commonly employ Defensive Deception tactics. For a variety of purposes, deceptive and anti-deceptive technologies have been created. However, there is a critical need for a broad, comprehensive and quantitative framework that can help us deploy advanced deception technologies. Computational intelligence provides an appropriate set of tools for creating advanced deception frameworks. Computational intelligence comprises two significant families of artificial intelligence technologies: deep learning and machine learning. These strategies can be used in various situations in Defensive Deception technologies. This survey focuses on Defensive Deception tactics deployed using the help of deep learning and machine learning algorithms. Prior work has yielded insights, lessons, and limitations presented in this study. It culminates with a discussion about future directions, which helps address the important gaps in present Defensive Deception research.
Collapse
|