Cybersecurity has become a very hot topic in recent years. Many communities, groups, and governments start to realize the importance and urgency to deal with the ever-changing cyberattacks.1,2 Experts in the industry and scholars in the academia strive to innovate the next-generation solutions. Among the technical solutions, machine learning–based methods receive an increasingly popular favor due to its superior efficiency comparing with manual analysis.2 In addition, the instantaneous protection brought by the machine learning–based solutions surpasses most reactive technologies including the automated protection systems in terms of reaction time. The general approach of machine learning–based cybersecurity solutions includes establishment of ground-truth data, feature extraction and engineering, and model tuning. To perform these steps, one needs domain-specific knowledge in cybersecurity and insights to machine learning principles and skills. This special issue aims to solicit cybersecurity researchers to publish the latest research findings in cybersecurity and privacy with the use of machine learning. With the conjunction of cybersecurity and machine learning, the submitted manuscripts have been evaluated in a rigorous and critical manner by professionals from different sections including both industry and academia. This review process leads to the seven accepted papers that are included in this special issue. These selected papers belong to three main research directions: system security, cybersecurity applications, and privacy applications.
[1]
Saeid Nahavandi,et al.
Machine learning–based haptic‐enabled surgical navigation with security awareness
,
2019,
Concurr. Comput. Pract. Exp..
[2]
Wanlei Zhou,et al.
Static malware clustering using enhanced deep embedding method
,
2019,
Concurr. Comput. Pract. Exp..
[3]
Paul Rimba,et al.
Data-Driven Cybersecurity Incident Prediction: A Survey
,
2019,
IEEE Communications Surveys & Tutorials.
[4]
Shigang Liu,et al.
A performance evaluation of deep‐learnt features for software vulnerability detection
,
2019,
Concurr. Comput. Pract. Exp..
[5]
Jun Zhang,et al.
Detecting and Preventing Cyber Insider Threats: A Survey
,
2018,
IEEE Communications Surveys & Tutorials.
[6]
Tianqing Zhu,et al.
Adversaries or allies? Privacy and deep learning in big data era
,
2019,
Concurr. Comput. Pract. Exp..
[7]
Tianqing Zhu,et al.
A Differentially Private Method for Crowdsourcing Data Submission
,
2018,
PAKDD.
[8]
Yu Wang,et al.
Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems
,
2019,
Concurr. Comput. Pract. Exp..
[9]
Hualei Shen,et al.
Anti‐noise image source identification
,
2019,
Concurr. Comput. Pract. Exp..