Provenance-based intrusion detection systems: A survey
Traditional Intrusion Detection Systems (IDS) cannot cope with the increasing number and
sophistication of cyberattacks such as Advanced Persistent Threats (APT). Due to their high …
sophistication of cyberattacks such as Advanced Persistent Threats (APT). Due to their high …
The significance of artificial intelligence in zero trust technologies: a comprehensive review
D Ajish - Journal of Electrical Systems and Information …, 2024 - Springer
In the era of cloud computing, cybersecurity has assumed paramount importance. As
organizations transition to cloud-based solutions, cyberattackers increasingly target cloud …
organizations transition to cloud-based solutions, cyberattackers increasingly target cloud …
Blockchain-enabled intrusion detection and prevention system of APTs within zero trust architecture
In a world where organisations are embracing new IT working models such as Bring Your
Own Device (BYOD) and remote working, the traditional mindset of defending the network …
Own Device (BYOD) and remote working, the traditional mindset of defending the network …
[HTML][HTML] Invoice# 31415 attached: Automated analysis of malicious Microsoft Office documents
V Koutsokostas, N Lykousas, T Apostolopoulos… - Computers & …, 2022 - Elsevier
Microsoft Office may be by far the most widely used suite for processing documents,
spreadsheets, and presentations. Due to its popularity, it is continuously utilised to carry out …
spreadsheets, and presentations. Due to its popularity, it is continuously utilised to carry out …
Nebula: Self-Attention for Dynamic Malware Analysis
Dynamic analysis enables detecting Windows malware by executing programs in a
controlled environment and logging their actions. Previous work has proposed training …
controlled environment and logging their actions. Previous work has proposed training …
Privacy, safety, and security in extended reality: user experience challenges for neurodiverse users
Neurodevelopmental disorders are a group of disorders that affect the development of the
nervous system, leading to abnormal brain function, which may affect emotion, learning …
nervous system, leading to abnormal brain function, which may affect emotion, learning …
How does Endpoint Detection use the {MITRE}{ATT&CK} Framework?
MITRE ATT&CK is an open-source taxonomy of adversary tactics, techniques, and
procedures based on real-world observations. Increasingly, organizations leverage ATT&CK …
procedures based on real-world observations. Increasingly, organizations leverage ATT&CK …
Evaluation of local security event management system vs. standard antivirus software
A Pérez-Sánchez, R Palacios - Applied Sciences, 2022 - mdpi.com
Featured Application This work can be applied to develop new anti-malware strategies
based on event analysis. Abstract The detection and classification of threats in computer …
based on event analysis. Abstract The detection and classification of threats in computer …
Application of data collected by endpoint detection and response systems for implementation of a network security system based on zero trust principles and the …
Traditionally, security systems for enterprises have implicit access based on strong
cryptography, authentication and key sharing, wherein access control is based on Role …
cryptography, authentication and key sharing, wherein access control is based on Role …
XMD: An expansive Hardware-telemetry based Mobile Malware Detector for Endpoint Detection
Hardware-based Malware Detectors (HMDs) have shown promise in detecting malicious
workloads. However, the current HMDs focus solely on the CPU core of a System-on-Chip …
workloads. However, the current HMDs focus solely on the CPU core of a System-on-Chip …