A survey of large language models for cyber threat detection

Y Chen, M Cui, D Wang, Y Cao, P Yang, B Jiang… - Computers & …, 2024 - Elsevier
With the increasing complexity of cyber threats and the expanding scope of cyberspace,
there exist progressively more challenges in cyber threat detection. It's proven that most …

Deep learning-powered malware detection in cyberspace: a contemporary review

A Redhu, P Choudhary, K Srinivasan, TK Das - Frontiers in Physics, 2024 - frontiersin.org
This article explores deep learning models in the field of malware detection in cyberspace,
aiming to provide insights into their relevance and contributions. The primary objective of the …

[HTML][HTML] Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience

N Basheer, S Islam, MKS Alwaheidi, S Papastergiou - Sensors, 2024 - mdpi.com
System-to-system communication via Application Programming Interfaces (APIs) plays a
pivotal role in the seamless interaction among software applications and systems for efficient …

[HTML][HTML] Malware detection based on api call sequence analysis: A gated recurrent unit–generative adversarial network model approach

N Owoh, J Adejoh, S Hosseinzadeh, M Ashawa… - Future Internet, 2024 - mdpi.com
Malware remains a major threat to computer systems, with a vast number of new samples
being identified and documented regularly. Windows systems are particularly vulnerable to …

Detection of HTTP DDoS Attacks Using NFStream and TensorFlow

M Chovanec, M Hasin, M Havrilla, E Chovancová - Applied Sciences, 2023 - mdpi.com
This paper focuses on the implementation of nfstream, an open source network data
analysis tool and machine learning model using the TensorFlow library for HTTP attack …

[HTML][HTML] Chaotic-Based Shellcode Encryption: A New Strategy for Bypassing Antivirus Mechanisms

GC Huang, KC Chang, TH Lai - Symmetry, 2024 - mdpi.com
This study employed chaotic systems as an innovative approach for shellcode obfuscation to
evade current antivirus detection methods. Standard AV solutions primarily rely on static …

[HTML][HTML] Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data

M Naseer, F Ullah, S Ijaz, H Naeem… - Sensors (Basel …, 2025 - pmc.ncbi.nlm.nih.gov
Android malware detection remains a critical issue for mobile security. Cybercriminals target
Android since it is the most popular smartphone operating system (OS). Malware detection …

Optimized Prediction of Airflow Volume in Under-Actuated Zones through Multilayer Perceptron Artificial Neural Network.

AM Arif, D Lestari, B Arifitama… - … Journal of Intelligent …, 2025 - search.ebscohost.com
This study addresses the challenge of predicting airflow volume in under-actuated zones,
where occupant behavior and environmental factors complicate standard models. To …

[PDF][PDF] Malware Detection Based on Optimized Deep Learning in Data-driven Mode

Y Zhao, Y Liu - 2024 - bit.kuas.edu.tw
This article mainly explores how to use optimized deep learning techniques for malware
detection in data-driven mode. A deep learning model was designed, which combines the …

ANOMALY DETECTION WITH API CALLS BY USING MACHINE LEARNING: SYSTEMATIC LITERATURE REVIEW

V Şahin, F Arat, S Akleylek - Current Trends in Computing, 2024 - dergipark.org.tr
API, in other words system calls are critical data sources for monitoring the operation of
systems and applications, and the data obtained from these calls provides a wealth of …