A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

Apelid: Enhancing real-time intrusion detection with augmented wgan and parallel ensemble learning

HV Vo, HP Du, HN Nguyen - Computers & Security, 2024 - Elsevier
This paper proposes an AI-powered intrusion detection method that improves intrusion
detection performance by increasing the quality of the training set and employing numerous …

Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks

L Deng, H Wen, M **n, H Li, Z Pan, L Sun - Computers & Security, 2023 - Elsevier
IoT malware analysis is crucial for understanding the behavior and purpose of malware
samples. While deep learning methods have been applied to IoT malware analysis using …

Efficient and generalized image-based CNN algorithm for multi-class malware detection

Y Liu, H Fan, J Zhao, J Zhang, X Yin - IEEE Access, 2024 - ieeexplore.ieee.org
With the popularity of electronic devices, the number of malware has increased dramatically,
posing a serious threat to the digital world. Accurately identifying malware has become a …

A Review of Deep Learning Based Malware Detection Techniques

H Wang, B Cui, Q Yuan, R Shi, M Huang - Neurocomputing, 2024 - Elsevier
With the popularization of computer technology, the number of malware has increased
dramatically in recent years. Some malware can threaten the network security of users by …

[PDF][PDF] Deep learning in phishing mitigation: a uniform resource locator-based predictive model

H Salah, H Zuhair - International Journal of Electrical and Computer …, 2023 - academia.edu
To mitigate the evolution of phish websites, various phishing prediction8 schemes are being
optimized eventually. However, the optimized methods produce gratuitous performance …

Cybersecurity for autonomous vehicles against malware attacks in smart-cities

S Aurangzeb, M Aleem, MT Khan, H Anwar… - Cluster …, 2024 - Springer
Abstract Smart Autonomous Vehicles (AVSs) are networks of Cyber-Physical Systems
(CPSs) in which they wirelessly communicate with other CPSs sub-systems (eg, smart …

Unveiling the dynamic landscape of malware sandboxing: A comprehensive review

E Debas, N Alhumam, K Riad - 2023 - preprints.org
In contemporary times, the landscape of malware analysis has advanced into an era of
sophisticated threat detection. Today's malware sandboxes not only conduct rudimentary …

Having Difficulty Understanding Manuals? Automatically Converting User Manuals into Instructional Videos

S Liu, S Wang, K Sun - Proceedings of the ACM on Human-Computer …, 2024 - dl.acm.org
While users tend to perceive instructional videos as an experience rather than a lesson with
a set of instructions, instructional videos are more effective and appealing than textual user …

Mitigating the Impact of Malware Evolution on API Sequence-based Windows Malware Detector

X Wei, C Li, Q Lv, N Li, D Sun, Y Wang - arxiv preprint arxiv:2408.01661, 2024 - arxiv.org
In dynamic Windows malware detection, deep learning models are extensively deployed to
analyze API sequences. Methods based on API sequences play a crucial role in malware …