Provenance-based intrusion detection systems: A survey

M Zipperle, F Gottwalt, E Chang, T Dillon - ACM Computing Surveys, 2022 - dl.acm.org
Traditional Intrusion Detection Systems (IDS) cannot cope with the increasing number and
sophistication of cyberattacks such as Advanced Persistent Threats (APT). Due to their high …

The significance of artificial intelligence in zero trust technologies: a comprehensive review

D Ajish - Journal of Electrical Systems and Information …, 2024 - Springer
In the era of cloud computing, cybersecurity has assumed paramount importance. As
organizations transition to cloud-based solutions, cyberattackers increasingly target cloud …

Blockchain-enabled intrusion detection and prevention system of APTs within zero trust architecture

L Alevizos, MH Eiza, VT Ta, Q Shi, J Read - Ieee Access, 2022 - ieeexplore.ieee.org
In a world where organisations are embracing new IT working models such as Bring Your
Own Device (BYOD) and remote working, the traditional mindset of defending the network …

[HTML][HTML] Invoice# 31415 attached: Automated analysis of malicious Microsoft Office documents

V Koutsokostas, N Lykousas, T Apostolopoulos… - Computers & …, 2022 - Elsevier
Microsoft Office may be by far the most widely used suite for processing documents,
spreadsheets, and presentations. Due to its popularity, it is continuously utilised to carry out …

Nebula: Self-Attention for Dynamic Malware Analysis

D Trizna, L Demetrio, B Biggio… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Dynamic analysis enables detecting Windows malware by executing programs in a
controlled environment and logging their actions. Previous work has proposed training …

Privacy, safety, and security in extended reality: user experience challenges for neurodiverse users

D Jones, S Ghasemi, D Gračanin, M Azab - International Conference on …, 2023 - Springer
Neurodevelopmental disorders are a group of disorders that affect the development of the
nervous system, leading to abnormal brain function, which may affect emotion, learning …

How does Endpoint Detection use the {MITRE}{ATT&CK} Framework?

A Virkud, MA Inam, A Riddle, J Liu, G Wang… - 33rd USENIX Security …, 2024 - usenix.org
MITRE ATT&CK is an open-source taxonomy of adversary tactics, techniques, and
procedures based on real-world observations. Increasingly, organizations leverage ATT&CK …

Evaluation of local security event management system vs. standard antivirus software

A Pérez-Sánchez, R Palacios - Applied Sciences, 2022 - mdpi.com
Featured Application This work can be applied to develop new anti-malware strategies
based on event analysis. Abstract The detection and classification of threats in computer …

Application of data collected by endpoint detection and response systems for implementation of a network security system based on zero trust principles and the …

N Kumar, GS Kasbekar, D Manjunath - ACM SIGMETRICS Performance …, 2023 - dl.acm.org
Traditionally, security systems for enterprises have implicit access based on strong
cryptography, authentication and key sharing, wherein access control is based on Role …

XMD: An expansive Hardware-telemetry based Mobile Malware Detector for Endpoint Detection

H Kumar, B Chakraborty, S Sharma… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Hardware-based Malware Detectors (HMDs) have shown promise in detecting malicious
workloads. However, the current HMDs focus solely on the CPU core of a System-on-Chip …