Ransomware: Recent advances, analysis, challenges and future research directions

C Beaman, A Barkworth, TD Akande, S Hakak… - Computers & …, 2021 - Elsevier
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks.
Different institutions such as healthcare, financial, and government have been targeted …

A survey of outlier detection in high dimensional data streams

I Souiden, MN Omri, Z Brahmi - Computer Science Review, 2022 - Elsevier
The rapid evolution of technology has led to the generation of high dimensional data
streams in a wide range of fields, such as genomics, signal processing, and finance. The …

Intrusion detection based on autoencoder and isolation forest in fog computing

K Sadaf, J Sultana - IEEe Access, 2020 - ieeexplore.ieee.org
Fog Computing has emerged as an extension to cloud computing by providing an efficient
infrastructure to support IoT. Fog computing acting as a mediator provides local processing …

A survey of techniques for mobile service encrypted traffic classification using deep learning

P Wang, X Chen, F Ye, Z Sun - Ieee Access, 2019 - ieeexplore.ieee.org
The rapid adoption of mobile devices has dramatically changed the access to various
networking services and led to the explosion of mobile service traffic. Mobile service traffic …

Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges

I Kara - Expert Systems with Applications, 2023 - Elsevier
The rapid advancements in cyber-attack strategies are in parallel with the measures for
detection, analysis, and prevention. Attackers have recently developed fileless malware that …

Intrusion detection based on bidirectional long short-term memory with attention mechanism

Y Yang, S Tu, RH Ali, H Alasmary, M Waqas… - 2023 - ro.ecu.edu.au
With the recent developments in the Internet of Things (IoT), the amount of data collected
has expanded tremendously, resulting in a higher demand for data storage, computational …

Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments

L Fernandez Maimo, A Huertas Celdran… - Sensors, 2019 - mdpi.com
Medical Cyber-Physical Systems (MCPS) hold the promise of reducing human errors and
optimizing healthcare by delivering new ways to monitor, diagnose and treat patients …

Preparing network intrusion detection deep learning models with minimal data using adversarial domain adaptation

A Singla, E Bertino, D Verma - Proceedings of the 15th ACM Asia …, 2020 - dl.acm.org
Recent work has shown that deep learning (DL) techniques are highly effective for assisting
network intrusion detection systems (NIDS) in identifying malicious attacks on networks …

Overcoming the lack of labeled data: Training intrusion detection models using transfer learning

A Singla, E Bertino, D Verma - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Deep learning (DL) techniques have recently been proposed for enhancing the accuracy of
network intrusion detection systems (NIDS). However, kee** the DL based detection …

Network intrusion detection using clustering and gradient boosting

P Verma, S Anwar, S Khan… - 2018 9th International …, 2018 - ieeexplore.ieee.org
An unauthorized activity on the network is called network intrusion and device or software
application which monitors the network parameters in order to detect such an intrusion is …