A survey on the evolution of fileless attacks and detection techniques

S Liu, G Peng, H Zeng, J Fu - Computers & Security, 2024 - Elsevier
Fileless attacks have gained significant prominence and have become the prevailing type of
attack in recent years. The exceptional level of stealthiness and difficulty in detection …

Blockchain-enabled intrusion detection and prevention system of APTs within zero trust architecture

L Alevizos, MH Eiza, VT Ta, Q Shi, J Read - Ieee Access, 2022 - ieeexplore.ieee.org
In a world where organisations are embracing new IT working models such as Bring Your
Own Device (BYOD) and remote working, the traditional mindset of defending the network …

[HTML][HTML] Искусственный интеллект и кибербезопасность

ДЕ Намиот, ЕА Ильюшин, ИВ Чижов - International Journal of …, 2022 - cyberleninka.ru
В этой статье мы рассматриваем связь систем искусственного интеллекта и
кибербезопасности. В современной трактовке, системы искусственного интеллекта …

HEOD: Human-assisted ensemble outlier detection for cybersecurity

P Najafi, F Cheng, C Meinel - Computers & Security, 2024 - Elsevier
Despite extensive academic research in anomaly detection within the cybersecurity domain,
its successful adoption in real-world settings remains limited. This paper addresses the …

Operating system and artificial intelligence: A systematic review

Y Zhang, X Zhao, J Yin, L Zhang, Z Chen - ar** and evaluating malware classification pipelines to reflect real-world needs is as
vital to protect users as it is hard to achieve. In many cases, the experimental conditions …