[HTML][HTML] A survey of malware detection using deep learning

A Bensaoud, J Kalita, M Bensaoud - Machine Learning With Applications, 2024 - Elsevier
The problem of malicious software (malware) detection and classification is a complex task,
and there is no perfect approach. There is still a lot of work to be done. Unlike most other …

AI-based ransomware detection: A comprehensive review

J Ferdous, R Islam, A Mahboubi, MZ Islam - IEEE Access, 2024 - ieeexplore.ieee.org
Ransomware attacks are becoming increasingly sophisticated, thereby rendering
conventional detection methods less effective. Recognizing this challenge, this study …

[HTML][HTML] Sinner: A reward-sensitive algorithm for imbalanced malware classification using neural networks with experience replay

A Coscia, A Iannacone, A Maci, A Stamerra - Information, 2024 - mdpi.com
Reports produced by popular malware analysis services showed a disparity in samples
available for different malware families. The unequal distribution between such classes can …

[HTML][HTML] A Malware-Detection Method Using Deep Learning to Fully Extract API Sequence Features

S Zhang, M Gao, L Wang, S Xu, W Shao, R Kuang - Electronics, 2025 - mdpi.com
Due to the rapid emergence of malware and its greater harm, the successful execution of
malware often brings incalculable losses. Consequently, the detection of malware has …

Optimized detection of cyber-attacks on IoT networks via hybrid deep learning models

A Bensaoud, J Kalita - Ad Hoc Networks, 2025 - Elsevier
The rapid expansion of Internet of Things (IoT) devices has significantly increased the
potential for cyber-attacks, making effective detection methods crucial for securing IoT …

Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition

L Yao, B Liu, Y **n - Journal of Information Security and Applications, 2024 - Elsevier
Malicious file attacks seriously affect network and data security, and recognizing malicious
files and variants is crucial for preventing network attacks. Faced with the challenge of …

[HTML][HTML] Exploration of salience theory to deep learning: Evidence from Chinese new energy market high-frequency trading

Q Zhu, J Du, Y Li - Data Science and Management, 2024 - Elsevier
Salience theory has been proposed as a new stock trading strategy. To assess the validity of
this proposal, a complex decision trading system was constructed based on salience theory …

iCNN-LSTM: A batch-based incremental ransomware detection system using Sysmon

J Ispahany, MD Islam, MA Khan, MD Islam - arxiv preprint arxiv …, 2025 - arxiv.org
In response to the increasing ransomware threat, this study presents a novel detection
system that integrates Convolutional Neural Networks (CNNs) and Long Short-Term …

Next-Generation Crime Detection and Transmitting: Evaluating Pre-Trained CNN Models

V Viswanatha, AC Ramachandra… - … Conference on Data …, 2024 - ieeexplore.ieee.org
Violence detection has garnered significant attention as there'sa growing demand for
automated methods to identify violent actions. This surge in interest stems from the utilization …

Opcode based malware detection using Stacked Recurrent Neural Networks and Convolutional Neural Networks

A Gokhale, Y Lad, A Mahaur… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Malwares is designed to infiltrate devices and in most cases the underlying operating
system and are packaged in multiple file formats. Considering that Windows operating …