Cybersecurity threats in FinTech: A systematic review
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
Research trends, challenges, and emerging topics in digital forensics: A review of reviews
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …
researchers and practitioners alike. The ever increasing sophistication of modern …
[HTML][HTML] APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework
W Han, J Xue, Y Wang, F Zhang, X Gao - Information Sciences, 2021 - Elsevier
APT attacks have posed serious threats to the security of cyberspace nowadays which are
usually tailored for specific targets. Identification and understanding of APT attacks remains …
usually tailored for specific targets. Identification and understanding of APT attacks remains …
HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection
Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of
OS events and on applying pattern matching procedures on binaries to detect malware. In …
OS events and on applying pattern matching procedures on binaries to detect malware. In …
Challenges and pitfalls in malware research
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …
research questions arose, such as how to make malware research reproducible, how to …
Antiviruses under the microscope: A hands-on perspective
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …
research has been done about them, especially proposing new detection procedures that …
Detection and classification of advanced persistent threats and attacks using the support vector machine
WL Chu, CJ Lin, KN Chang - Applied Sciences, 2019 - mdpi.com
Traditional network attack and hacking models are constantly evolving to keep pace with the
rapid development of network technology. Advanced persistent threat (APT), usually …
rapid development of network technology. Advanced persistent threat (APT), usually …
CMD: co-analyzed iot malware detection and forensics via network and hardware domains
With the widespread use of Internet of Things (IoT) devices, malware detection has become
a hot spot for both academic and industrial communities. Existing approaches can be …
a hot spot for both academic and industrial communities. Existing approaches can be …
Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints
AntiViruses (AVs) are essential to face the myriad of malware threatening Internet users. AVs
operate in two modes: on-demand checks and real-time verification. Software-based real …
operate in two modes: on-demand checks and real-time verification. Software-based real …
Review of human decision-making during computer security incident analysis
We review practical advice on decision-making during computer security incident response.
Scope includes standards from the IETF, ISO, FIRST, and the US intelligence community. To …
Scope includes standards from the IETF, ISO, FIRST, and the US intelligence community. To …