Ransomware detection using the dynamic analysis and machine learning: A survey and research directions

U Urooj, BAS Al-rimy, A Zainal, FA Ghaleb… - Applied Sciences, 2021‏ - mdpi.com
Ransomware is an ill-famed malware that has received recognition because of its lethal and
irrevocable effects on its victims. The irreparable loss caused due to ransomware requires …

[HTML][HTML] Comparative analysis of blockchain technology to support digital transformation in ports and ship**

DH Alahmadi, FA Baothman, MM Alrajhi… - Journal of Intelligent …, 2022‏ - degruyter.com
Blockchain is one of the technologies that can support digital transformation in industries in
many aspects. This sophisticated technology can provide a decentralized, transparent, and …

Image-based malware classification using VGG19 network and spatial convolutional attention

MJ Awan, OA Masood, MA Mohammed, A Yasin… - Electronics, 2021‏ - mdpi.com
In recent years the amount of malware spreading through the internet and infecting
computers and other communication devices has tremendously increased. To date …

Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks

DK Sharma, T Dhankhar, G Agrawal, SK Singh… - Ad Hoc Networks, 2021‏ - Elsevier
Internet of things or in short IoT is a network of interconnected entities such as computing
devices, mechanical machines, digital gadgets etc. Cloud based IoT infrastructures are …

An improved mutual information feature selection technique for intrusion detection systems in the Internet of Medical Things

M Alalhareth, SC Hong - Sensors, 2023‏ - mdpi.com
In healthcare, the Internet of Things (IoT) is used to remotely monitor patients and provide
real-time diagnoses, which is referred to as the Internet of Medical Things (IoMT). This …

Quantum Mayfly optimization with encoder-decoder driven LSTM networks for malware detection and classification model

OA Alzubi, JA Alzubi, TM Alzubi, A Singh - Mobile Networks and …, 2023‏ - Springer
Malware refers to malicious software developed to penetrate or damage a computer system
without any owner's informed consent. It uses target system susceptibilities, like bugs in …

Mitigating the risks of malware attacks with deep Learning techniques

AM Alnajim, S Habib, M Islam, R Albelaihi… - Electronics, 2023‏ - mdpi.com
Malware has become increasingly prevalent in recent years, endangering people,
businesses, and digital assets worldwide. Despite the numerous techniques and …

Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction

FM Aswad, AN Kareem, AM Khudhur… - Journal of Intelligent …, 2021‏ - degruyter.com
Floods are one of the most common natural disasters in the world that affect all aspects of
life, including human beings, agriculture, industry, and education. Research for develo** …

Application layer security for internet communications: A comprehensive review, challenges, and future trends

D Cevallos-Salas, J Estrada-Jiménez… - Computers and Electrical …, 2024‏ - Elsevier
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …

Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat

I Herrera Montano, JJ García Aranda, J Ramos Diaz… - Cluster …, 2022‏ - Springer
Data leakage is a problem that companies and organizations face every day around the
world. Mainly the data leak caused by the internal threat posed by authorized personnel to …