A survey on malware detection with graph representation learning
T Bilot, N El Madhoun, K Al Agha, A Zouaoui - ACM Computing Surveys, 2024 - dl.acm.org
Malware detection has become a major concern due to the increasing number and
complexity of malware. Traditional detection methods based on signatures and heuristics …
complexity of malware. Traditional detection methods based on signatures and heuristics …
A Survey on Graph Neural Networks for Intrusion Detection Systems: Methods, Trends and Challenges
Intrusion detection systems (IDS) play a crucial role in maintaining network security. With the
increasing sophistication of cyber attack methods, traditional detection approaches are …
increasing sophistication of cyber attack methods, traditional detection approaches are …
GNN-based beamforming for sum-rate maximization in MU-MISO networks
The advantages of graph neural networks (GNNs) in leveraging the graph topology of
wireless networks have drawn increasing attentions. This paper studies the GNN-based …
wireless networks have drawn increasing attentions. This paper studies the GNN-based …
Rethinking causal relationships learning in graph neural networks
Graph Neural Networks (GNNs) demonstrate their significance by effectively modeling
complex interrelationships within graph-structured data. To enhance the credibility and …
complex interrelationships within graph-structured data. To enhance the credibility and …
Generating Robust Counterfactual Witnesses for Graph Neural Networks
This paper introduces a new class of explanation structures, called robust counterfactual
witnesses (RCWs), to provide robust, both counterfactual and factual explanations for graph …
witnesses (RCWs), to provide robust, both counterfactual and factual explanations for graph …
Network Intrusion Detection Based on Feature Image and Deformable Vision Transformer Classification
K He, W Zhang, X Zong, L Lian - IEEE Access, 2024 - ieeexplore.ieee.org
Network intrusion detection technology has always been an indispensable protection
mechanism for industrial network security. The rise of new forms of network attacks has …
mechanism for industrial network security. The rise of new forms of network attacks has …
SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter
In the dynamic and rapidly evolving world of social media, detecting anomalous users has
become a crucial task to address malicious activities such as misinformation and …
become a crucial task to address malicious activities such as misinformation and …
CGAAD: Centrality-and Graph-Aware Deep Learning Model for Detecting Cyberattacks Targeting Industrial Control Systems in Critical Infrastructure
TNI Alrumaih, MJF Alenazi - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Industrial control systems (ICSs) are crucial in managing critical infrastructure, making their
security a paramount concern. In recent years, their widespread adoption, together with the …
security a paramount concern. In recent years, their widespread adoption, together with the …
An Analysis of Botnet Detection Using Graph Neural Network
F Alizadeh, M Khansari - 2023 13th International Conference on …, 2023 - ieeexplore.ieee.org
The use of artificial intelligence, especially Graph Neural Network (GNN), in solving cyber
security issues brings challenges. We address three challenges of GNN for botnet detection …
security issues brings challenges. We address three challenges of GNN for botnet detection …
Enhancing Multi-Class Attack Detection in Graph Neural Network through Feature Rearrangement
HD Le, M Park - Electronics, 2024 - mdpi.com
As network sizes grow, attack schemes not only become more varied but also increase in
complexity. This diversification leads to a proliferation of attack variants, complicating the …
complexity. This diversification leads to a proliferation of attack variants, complicating the …