A survey of large language models for cyber threat detection
With the increasing complexity of cyber threats and the expanding scope of cyberspace,
there exist progressively more challenges in cyber threat detection. It's proven that most …
there exist progressively more challenges in cyber threat detection. It's proven that most …
Deep learning-powered malware detection in cyberspace: a contemporary review
This article explores deep learning models in the field of malware detection in cyberspace,
aiming to provide insights into their relevance and contributions. The primary objective of the …
aiming to provide insights into their relevance and contributions. The primary objective of the …
[HTML][HTML] Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience
System-to-system communication via Application Programming Interfaces (APIs) plays a
pivotal role in the seamless interaction among software applications and systems for efficient …
pivotal role in the seamless interaction among software applications and systems for efficient …
[HTML][HTML] Malware detection based on api call sequence analysis: A gated recurrent unit–generative adversarial network model approach
Malware remains a major threat to computer systems, with a vast number of new samples
being identified and documented regularly. Windows systems are particularly vulnerable to …
being identified and documented regularly. Windows systems are particularly vulnerable to …
Detection of HTTP DDoS Attacks Using NFStream and TensorFlow
This paper focuses on the implementation of nfstream, an open source network data
analysis tool and machine learning model using the TensorFlow library for HTTP attack …
analysis tool and machine learning model using the TensorFlow library for HTTP attack …
[HTML][HTML] Chaotic-Based Shellcode Encryption: A New Strategy for Bypassing Antivirus Mechanisms
GC Huang, KC Chang, TH Lai - Symmetry, 2024 - mdpi.com
This study employed chaotic systems as an innovative approach for shellcode obfuscation to
evade current antivirus detection methods. Standard AV solutions primarily rely on static …
evade current antivirus detection methods. Standard AV solutions primarily rely on static …
[HTML][HTML] Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data
M Naseer, F Ullah, S Ijaz, H Naeem… - Sensors (Basel …, 2025 - pmc.ncbi.nlm.nih.gov
Android malware detection remains a critical issue for mobile security. Cybercriminals target
Android since it is the most popular smartphone operating system (OS). Malware detection …
Android since it is the most popular smartphone operating system (OS). Malware detection …
Optimized Prediction of Airflow Volume in Under-Actuated Zones through Multilayer Perceptron Artificial Neural Network.
This study addresses the challenge of predicting airflow volume in under-actuated zones,
where occupant behavior and environmental factors complicate standard models. To …
where occupant behavior and environmental factors complicate standard models. To …
[PDF][PDF] Malware Detection Based on Optimized Deep Learning in Data-driven Mode
Y Zhao, Y Liu - 2024 - bit.kuas.edu.tw
This article mainly explores how to use optimized deep learning techniques for malware
detection in data-driven mode. A deep learning model was designed, which combines the …
detection in data-driven mode. A deep learning model was designed, which combines the …
ANOMALY DETECTION WITH API CALLS BY USING MACHINE LEARNING: SYSTEMATIC LITERATURE REVIEW
API, in other words system calls are critical data sources for monitoring the operation of
systems and applications, and the data obtained from these calls provides a wealth of …
systems and applications, and the data obtained from these calls provides a wealth of …