Malware detection issues, challenges, and future directions: A survey
The evolution of recent malicious software with the rising use of digital services has
increased the probability of corrupting data, stealing information, or other cybercrimes by …
increased the probability of corrupting data, stealing information, or other cybercrimes by …
Intrusion detection systems: A cross-domain overview
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …
information of users, companies, and industries. However, the growth of the information …
[HTML][HTML] Ransomware early detection by the analysis of file sharing traffic
Crypto ransomware is a type of malware that locks access to user files by encrypting them
and demands a ransom in order to obtain the decryption key. This type of malware has …
and demands a ransom in order to obtain the decryption key. This type of malware has …
Applications in security and evasions in machine learning: a survey
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …
privacy in various applications. ML is used to address serious issues such as real-time …
Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures
The evolving trends of mobility, cloud computing and collaboration have blurred the
perimeter separating corporate networks from the wider world. These new tools and …
perimeter separating corporate networks from the wider world. These new tools and …
Latent semantic analysis and graph theory for alert correlation: A proposed approach for iot botnet detection
In recent times, the proliferation of Internet of Things (IoT) technology has brought a
significant shift in the digital transformation of various industries. The enabling technologies …
significant shift in the digital transformation of various industries. The enabling technologies …
A novel self-organizing network solution towards crypto-ransomware mitigation
In the last decade, crypto-ransomware evolved from a family of malicious software with
scarce repercussion in the research community, to a sophisticated and highly effective …
scarce repercussion in the research community, to a sophisticated and highly effective …
Espada: Enhanced payload analyzer for malware detection robust against adversarial threats
The emergent communication technologies landscape has consolidated the anomaly-based
intrusion detection paradigm as one of the most prominent solutions able to discover …
intrusion detection paradigm as one of the most prominent solutions able to discover …
An effective ransomware detection approach in a cloud environment using volatile memory features
Cloud computing has become one of the most preferred solutions for enterprises to
implement and extend various enterprise applications. The importance of virtual servers in …
implement and extend various enterprise applications. The importance of virtual servers in …
RaDaR: A Real-Word Dataset for AI powered Run-time Detection of Cyber-Attacks
Artificial Intelligence techniques on malware run-time behavior have emerged as a
promising tool in the arms race against sophisticated and stealthy cyber-attacks. While data …
promising tool in the arms race against sophisticated and stealthy cyber-attacks. While data …