Deep learning applications on cybersecurity: a practical approach
| dc.contributor.author | Miranda García, Alberto | |
| dc.contributor.author | Zubillaga Rego, Agustín José | |
| dc.contributor.author | Pastor López, Iker | |
| dc.contributor.author | Sanz Urquijo, Borja | |
| dc.contributor.author | Tellaeche Iglesias, Alberto | |
| dc.contributor.author | Gaviria de la Puerta, José | |
| dc.contributor.author | García Bringas, Pablo | |
| dc.date.accessioned | 2025-10-30T08:26:24Z | |
| dc.date.available | 2025-10-30T08:26:24Z | |
| dc.date.issued | 2024-01-01 | |
| dc.date.updated | 2025-10-30T08:26:24Z | |
| dc.description.abstract | One of the most difficult challenges for computer systems has been security. On the other hand, new developments in machine learning are having an impact on almost every aspect of computer science, including cybersecurity. To analyze this impact, we have created three distinct cybersecurity-related problems to show the advantages of deep learning techniques. We examined their potential applications for SPAM filtering, detecting malicious software, and adult-content detection. We experimented with various techniques, such as Long Short-Term Memory (LSTMs) for spam filtering, Deep Neural Networks (DNNs) for malware detection, Convolutional Neural Networks (CNNs) combined with Transfer Learning for adult content detection and image augmentation methods. We are able to achieve an Area Under ROC Curve greater than 0.94 in every scenario, proving that excellent performance with a good relation between cost and effectiveness may be created without the need of complex designs. | en |
| dc.identifier.citation | Miranda-García, A., Rego, A. Z., Pastor-López, I., Sanz, B., Tellaeche, A., Gaviria, J., & Bringas, P. G. (2024). Deep learning applications on cybersecurity: a practical approach. Neurocomputing, 563. https://doi.org/10.1016/J.NEUCOM.2023.126904 | |
| dc.identifier.doi | 10.1016/J.NEUCOM.2023.126904 | |
| dc.identifier.eissn | 1872-8286 | |
| dc.identifier.issn | 0925-2312 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14454/4140 | |
| dc.language.iso | eng | |
| dc.publisher | Elsevier B.V. | |
| dc.rights | © 2023 Elsevier B.V. | |
| dc.subject.other | Cybersecurity | |
| dc.subject.other | Deep learning | |
| dc.subject.other | Image classification | |
| dc.subject.other | NLP | |
| dc.subject.other | Transfer learning | |
| dc.title | Deep learning applications on cybersecurity: a practical approach | en |
| dc.type | journal article | |
| dcterms.accessRights | metadata only access | |
| oaire.citation.title | Neurocomputing | |
| oaire.citation.volume | 563 |