About this Research Topic
With the popularity of big data, the use of deep learning has been growing in a wide range of cybersecurity applications like intrusion and malware detection, user authentication (biometrics), user privacy, etc. Deep learning can be used to process and learn from the underlying IoT data to improve the threat assessment and attack identification as well as recognize breaches within the IoT ecosystem. Deep learning can also be applied to identify advanced threats such as organization profiling, infrastructure vulnerabilities, and potential interdependent vulnerabilities and exploits. Deep learning can significantly change the cybersecurity landscape. For example, traditional signature-based techniques for malware detection cannot keep up with the pace of new attacks and variants. New attacks and sophisticated malware have been able to bypass network and end-point detection to deliver cyber-attacks at alarming rates. The enormous scale of the latest ransomware attacks continues to remind us how difficult it is to protect networks from being infiltrated. Deep learning can be leveraged to learn the new defense mechanisms using all available data and address the growing cybersecurity problem.
This Research Topic focuses on recent advances in research and development in securing the IoT landscape using deep learning. The objective of this collection is to bring together researchers from both deep learning and cybersecurity domains to provide a venue to share ideas and foster knowledge on IoT security challenges and solutions.
Papers can be from any of the following areas, including but not limited to:
● Vehicular ad-hoc network, smart home, healthcare, and smart meter security
● Real-time/anti-adversarial/efficient deep learning security protocols/solutions
● Intrusion detection and prevention
● Malware detection
● Data security and privacy
● Anomaly detection in authentication, authorization, and data requests
● Adversarial machine learning and the robustness ofAI models against malicious actions
● Interpretability and explainability of deep learning models
● Privacy-preserving deep learning algorithms
● Trustworthy deep learning
● Deep graph learning
● Fog-based IoT security
● Sensor network security
● Cloud-based IoT security
Keywords: Deep Learning, Cybersecurity, Internet of Things (IoT), Machine Learning, Intrusion Detection, Malware Detection, Data Privacy
Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.