An ontology-driven framework for knowledge representation of digital extortion attacks
M Keshavarzi, HR Ghaffary - Computers in Human Behavior, 2023 - Elsevier
With the COVID-19 pandemic and the growing influence of the Internet in critical sectors of
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …
A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
Yamme: a yara-byte-signatures metamorphic mutation engine
Recognition of known malicious patterns through signature-based systems is unsuccessful
against malware for which no known signature exists to identify them. These include not only …
against malware for which no known signature exists to identify them. These include not only …
A game-theoretic approach to containing artificial general intelligence: Insights from highly autonomous aggressive malware
Artificial General Intelligence (AGI) promises transformative societal changes but poses
safety and containment challenges. Large Language Models like ChatGPT have intensified …
safety and containment challenges. Large Language Models like ChatGPT have intensified …
HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection
Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of
OS events and on applying pattern matching procedures on binaries to detect malware. In …
OS events and on applying pattern matching procedures on binaries to detect malware. In …
[HTML][HTML] WebAssembly diversification for malware evasion
WebAssembly has become a crucial part of the modern web, offering a faster alternative to
JavaScript in browsers. While boosting rich applications in browser, this technology is also …
JavaScript in browsers. While boosting rich applications in browser, this technology is also …
CMD: co-analyzed iot malware detection and forensics via network and hardware domains
With the widespread use of Internet of Things (IoT) devices, malware detection has become
a hot spot for both academic and industrial communities. Existing approaches can be …
a hot spot for both academic and industrial communities. Existing approaches can be …
Machine learning (in) security: A stream of problems
Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-
the-art for solving many of the open issues in that field. However, it is very difficult to evaluate …
the-art for solving many of the open issues in that field. However, it is very difficult to evaluate …
[PDF][PDF] A Review of Intrusion Detection System Methods and Techniques: Past, Present and Future
YH Alagrash, HS Mehdy… - International Journal on …, 2023 - iotpe.tabaelm.com
The intrusion detection system (IDS) is a rapidly expanding field that continues to attract
interest due to the increasing variety of its applications. It has been the topic of research, with …
interest due to the increasing variety of its applications. It has been the topic of research, with …
{DVa}: Extracting Victims and Abuse Vectors from Android Accessibility Malware
The Android accessibility (a11y) service is widely abused by malware to conduct on-device
monetization fraud. Existing mitigation techniques focus on malware detection but overlook …
monetization fraud. Existing mitigation techniques focus on malware detection but overlook …