A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
Apelid: Enhancing real-time intrusion detection with augmented wgan and parallel ensemble learning
This paper proposes an AI-powered intrusion detection method that improves intrusion
detection performance by increasing the quality of the training set and employing numerous …
detection performance by increasing the quality of the training set and employing numerous …
Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks
L Deng, H Wen, M **n, H Li, Z Pan, L Sun - Computers & Security, 2023 - Elsevier
IoT malware analysis is crucial for understanding the behavior and purpose of malware
samples. While deep learning methods have been applied to IoT malware analysis using …
samples. While deep learning methods have been applied to IoT malware analysis using …
Efficient and generalized image-based CNN algorithm for multi-class malware detection
Y Liu, H Fan, J Zhao, J Zhang, X Yin - IEEE Access, 2024 - ieeexplore.ieee.org
With the popularity of electronic devices, the number of malware has increased dramatically,
posing a serious threat to the digital world. Accurately identifying malware has become a …
posing a serious threat to the digital world. Accurately identifying malware has become a …
A Review of Deep Learning Based Malware Detection Techniques
H Wang, B Cui, Q Yuan, R Shi, M Huang - Neurocomputing, 2024 - Elsevier
With the popularization of computer technology, the number of malware has increased
dramatically in recent years. Some malware can threaten the network security of users by …
dramatically in recent years. Some malware can threaten the network security of users by …
[PDF][PDF] Deep learning in phishing mitigation: a uniform resource locator-based predictive model
To mitigate the evolution of phish websites, various phishing prediction8 schemes are being
optimized eventually. However, the optimized methods produce gratuitous performance …
optimized eventually. However, the optimized methods produce gratuitous performance …
Cybersecurity for autonomous vehicles against malware attacks in smart-cities
Abstract Smart Autonomous Vehicles (AVSs) are networks of Cyber-Physical Systems
(CPSs) in which they wirelessly communicate with other CPSs sub-systems (eg, smart …
(CPSs) in which they wirelessly communicate with other CPSs sub-systems (eg, smart …
Unveiling the dynamic landscape of malware sandboxing: A comprehensive review
E Debas, N Alhumam, K Riad - 2023 - preprints.org
In contemporary times, the landscape of malware analysis has advanced into an era of
sophisticated threat detection. Today's malware sandboxes not only conduct rudimentary …
sophisticated threat detection. Today's malware sandboxes not only conduct rudimentary …
Having Difficulty Understanding Manuals? Automatically Converting User Manuals into Instructional Videos
While users tend to perceive instructional videos as an experience rather than a lesson with
a set of instructions, instructional videos are more effective and appealing than textual user …
a set of instructions, instructional videos are more effective and appealing than textual user …
Mitigating the Impact of Malware Evolution on API Sequence-based Windows Malware Detector
X Wei, C Li, Q Lv, N Li, D Sun, Y Wang - arxiv preprint arxiv:2408.01661, 2024 - arxiv.org
In dynamic Windows malware detection, deep learning models are extensively deployed to
analyze API sequences. Methods based on API sequences play a crucial role in malware …
analyze API sequences. Methods based on API sequences play a crucial role in malware …