The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review
Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity
experts are seriously considering artificial intelligence as a potential field that can aid …
experts are seriously considering artificial intelligence as a potential field that can aid …
Yamme: a yara-byte-signatures metamorphic mutation engine
Recognition of known malicious patterns through signature-based systems is unsuccessful
against malware for which no known signature exists to identify them. These include not only …
against malware for which no known signature exists to identify them. These include not only …
Comparing attack models for it systems: Lockheed martin's cyber kill chain, mitre att&ck framework and diamond model
Cyberattacks are a serious challenge for any IT system, which motivates cybersecurity
professionals and developers to constantly explore various attack models to analyse the …
professionals and developers to constantly explore various attack models to analyse the …
Threat hunting architecture using a machine learning approach for critical infrastructures protection
M Aragonés Lozano, I Pérez Llopis… - Big data and cognitive …, 2023 - mdpi.com
The number and the diversity in nature of daily cyber-attacks have increased in the last few
years, and trends show that both will grow exponentially in the near future. Critical …
years, and trends show that both will grow exponentially in the near future. Critical …
Fuzzy-import hashing: A static analysis technique for malware detection
The advent of new malware types and their attack vectors poses serious challenges for
security experts in discovering effective malware detection and analysis techniques. The …
security experts in discovering effective malware detection and analysis techniques. The …
Android Malware Classification Based on Fuzzy Hashing Visualization
H Rodriguez-Bazan, G Sidorov… - Machine Learning and …, 2023 - mdpi.com
The proliferation of Android-based devices has brought about an unprecedented surge in
mobile application usage, making the Android ecosystem a prime target for cybercriminals …
mobile application usage, making the Android ecosystem a prime target for cybercriminals …
Application of the SAMA methodology to Ryuk malware
Malware analysis is an essential discipline for understanding the nature, attack vectors, and
weaknesses of systems to combat the threats that emerge every day in the IT security world …
weaknesses of systems to combat the threats that emerge every day in the IT security world …
Cybercrime specialization: An exposé of a malicious Android Obfuscation-as-a-Service
V Šembera, M Paquet-Clouston… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Malware authors constantly obfuscate their files and defenders regularly develop new
techniques to detect them. Given this cat-and-mouse game, specialized obfuscation services …
techniques to detect them. Given this cat-and-mouse game, specialized obfuscation services …
Assessing the effectiveness of yara rules for signature-based malware detection and classification
A Lockett - arxiv preprint arxiv:2111.13910, 2021 - arxiv.org
Malware often uses obfuscation techniques or is modified slightly to evade signature
detection from antivirus software and malware analysis tools. Traditionally, to determine if a …
detection from antivirus software and malware analysis tools. Traditionally, to determine if a …
Cyberattack analysis utilising attack tree with weighted mean probability and risk of attack
As technology advances and AI becomes embedded and accepted into everyday life, the
risk of cyberattacks by adversaries increases. These cyberattacks are ubiquitous affecting …
risk of cyberattacks by adversaries increases. These cyberattacks are ubiquitous affecting …