Research Area:  CyberSecurity
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial-style description of each DL method is provided, including deep autoencoders, restricted Boltzmann machines, recurrent neural networks, generative adversarial networks, and several others. Then we discuss how each of the DL methods is used for security applications. We cover a broad array of attack types including malware, spam, insider threats, network intrusions, false data injection, and malicious domain names used by botnets.
Keywords:  
Author(s) Name:  Daniel S. Berman, Anna L. Buczak ,Jeffrey S. Chavis and Cherita L. Corbett
Journal name:  Information
Conferrence name:  
Publisher name:  MDPI
DOI:  10.3390/info10040122
Volume Information:  Volume 10,Issue 4
Paper Link:   https://www.mdpi.com/2078-2489/10/4/122