A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023‏ - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

A survey of adversarial attack and defense methods for malware classification in cyber security

S Yan, J Ren, W Wang, L Sun… - … Surveys & Tutorials, 2022‏ - ieeexplore.ieee.org
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …

Inadequacies of large language model benchmarks in the era of generative artificial intelligence

TR McIntosh, T Susnjak, N Arachchilage, T Liu… - arxiv preprint arxiv …, 2024‏ - arxiv.org
The rapid rise in popularity of Large Language Models (LLMs) with emerging capabilities
has spurred public curiosity to evaluate and compare different LLMs, leading many …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022‏ - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware

X Zhang, Y Zhang, M Zhong, D Ding, Y Cao… - Proceedings of the …, 2020‏ - dl.acm.org
Machine learning (ML) classifiers have been widely deployed to detect Android malware,
but at the same time the application of ML classifiers also faces an emerging problem. The …

The circle of life: A {large-scale} study of the {IoT} malware lifecycle

O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021‏ - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …

Android ransomware detection based on a hybrid evolutionary approach in the context of highly imbalanced data

I Almomani, R Qaddoura, M Habib, S Alsoghyer… - IEEE …, 2021‏ - ieeexplore.ieee.org
In recent years, Ransomware has been a critical threat that attacks smartphones.
Ransomware is a kind of malware that blocks the mobile's system and prevents the user of …

[HTML][HTML] A systematic literature review on windows malware detection: Techniques, research issues, and future directions

P Maniriho, AN Mahmood, MJM Chowdhury - Journal of Systems and …, 2024‏ - Elsevier
The aim of this systematic literature review (SLR) is to provide a comprehensive overview of
the current state of Windows malware detection techniques, research issues, and future …

A survey on malware detection with graph representation learning

T Bilot, N El Madhoun, K Al Agha, A Zouaoui - ACM Computing Surveys, 2024‏ - dl.acm.org
Malware detection has become a major concern due to the increasing number and
complexity of malware. Traditional detection methods based on signatures and heuristics …

A Systematical and longitudinal study of evasive behaviors in windows malware

N Galloro, M Polino, M Carminati, A Continella… - Computers & …, 2022‏ - Elsevier
Malware is one of the prevalent security threats. Sandboxes and, more generally,
instrumented environments play a crucial role in dynamically analyzing malware samples …