[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …

Evaluating realistic adversarial attacks against machine learning models for Windows PE Malware Detection

M Imran, A Appice, D Malerba - Future Internet, 2024 - mdpi.com
During the last decade, the cybersecurity literature has conferred a high-level role to
machine learning as a powerful security paradigm to recognise malicious software in …

An efficient boosting-based windows malware family classification system using multi-features fusion

Z Chen, X Ren - Applied Sciences, 2023 - mdpi.com
In previous years, cybercriminals have utilized various strategies to evade identification,
including obfuscation, confusion, and polymorphism technology, resulting in an exponential …

An optimized LSTM-based deep learning model for anomaly network intrusion detection

N Dash, S Chakravarty, AK Rath, NC Giri… - Scientific Reports, 2025 - nature.com
The increasing prevalence of network connections is driving a continuous surge in the
requirement for network security and safeguarding against cyberattacks. This has triggered …

Trends of Optimization Algorithms from Supervised Learning Perspective

R Paul, KN Das - Journal of Computational and Cognitive …, 2024 - ojs.bonviewpress.com
Machine learning (ML) is rapidly evolving, leading to numerous theoretical advancements
and widespread applications across multiple fields. The goal of ML is to enable machines to …

Enhancing cyber-threat intelligence in the arab world: Leveraging ioc and misp integration

IY Alzahrani, S Lee, K Kim - Electronics, 2024 - mdpi.com
Cybercrime threat intelligence enables proactive measures against threat actors and
informed, data-driven security decisions. This study proposes a practical implementation of …

Intrusion detection in vehicle controller area network (can) bus using machine learning: A comparative performance study

BS Bari, K Yelamarthi, S Ghafoor - Sensors, 2023 - mdpi.com
Electronic Control Units (ECUs) have been increasingly used in modern vehicles to control
the operations of the vehicle, improve driving comfort, and safety. For the operation of the …

[PDF][PDF] XAI-PDF: a robust framework for malicious PDF detection leveraging SHAP-based feature engineering.

M Al-Fayoumi, QA Al-Haija, R Armoush… - Int. Arab J. Inf. Technol …, 2024 - iajit.org
With the increasing number of malicious PDF files used for cyberattacks, it is essential to
develop efficient and accurate classifiers to detect and prevent these threats. Machine …

Hyperparameter Tuning Menggunakan GridsearchCV pada Random Forest untuk Deteksi Malware

IMM Matin - MULTINETICS, 2023 - jurnal.pnj.ac.id
Random forest is one of the popular machine learning algorithms used for classification
tasks. In malware detection tasks, random forest can help identify malware with good …

[HTML][HTML] A Novel Malware Detection Model in the Software Supply Chain Based on LSTM and SVMs

S Zhou, H Li, X Fu, Y Jiao - Applied Sciences, 2024 - mdpi.com
With the increasingly severe challenge of Software Supply Chain (SSC) security, the rising
trend in guarding against security risks has attracted widespread attention. Existing …