A survey on the evolution of fileless attacks and detection techniques
S Liu, G Peng, H Zeng, J Fu - Computers & Security, 2024 - Elsevier
Fileless attacks have gained significant prominence and have become the prevailing type of
attack in recent years. The exceptional level of stealthiness and difficulty in detection …
attack in recent years. The exceptional level of stealthiness and difficulty in detection …
Blockchain-enabled intrusion detection and prevention system of APTs within zero trust architecture
In a world where organisations are embracing new IT working models such as Bring Your
Own Device (BYOD) and remote working, the traditional mindset of defending the network …
Own Device (BYOD) and remote working, the traditional mindset of defending the network …
[HTML][HTML] Искусственный интеллект и кибербезопасность
ДЕ Намиот, ЕА Ильюшин, ИВ Чижов - International Journal of …, 2022 - cyberleninka.ru
В этой статье мы рассматриваем связь систем искусственного интеллекта и
кибербезопасности. В современной трактовке, системы искусственного интеллекта …
кибербезопасности. В современной трактовке, системы искусственного интеллекта …
HEOD: Human-assisted ensemble outlier detection for cybersecurity
Despite extensive academic research in anomaly detection within the cybersecurity domain,
its successful adoption in real-world settings remains limited. This paper addresses the …
its successful adoption in real-world settings remains limited. This paper addresses the …
Operating system and artificial intelligence: A systematic review
Y Zhang, X Zhao, J Yin, L Zhang, Z Chen - ar** and evaluating malware classification pipelines to reflect real-world needs is as
vital to protect users as it is hard to achieve. In many cases, the experimental conditions …
vital to protect users as it is hard to achieve. In many cases, the experimental conditions …