Unmasking cybercrime with artificial-intelligence-driven cybersecurity analytics
Cybercriminals are becoming increasingly intelligent and aggressive, making them more
adept at covering their tracks, and the global epidemic of cybercrime necessitates significant …
adept at covering their tracks, and the global epidemic of cybercrime necessitates significant …
An Overview of Malware Injection Attacks: Techniques, Impacts, and Countermeasures
R Madhvan, MF Zolkipli - Borneo International Journal eISSN 2636 …, 2023 - majmuah.com
With continuous advancement of technology, the frequency of malware injection attacks has
risen, posing significant risks to the security of computer systems and networks. This …
risen, posing significant risks to the security of computer systems and networks. This …
Deep learning-powered malware detection in cyberspace: a contemporary review
A Redhu, P Choudhary, K Srinivasan, TK Das - Frontiers in Physics, 2024 - frontiersin.org
This article explores deep learning models in the field of malware detection in cyberspace,
aiming to provide insights into their relevance and contributions. The primary objective of the …
aiming to provide insights into their relevance and contributions. The primary objective of the …
[HTML][HTML] A novel machine learning approach for detecting first-time-appeared malware
Conventional malware detection approaches have the overhead of feature extraction, the
requirement of domain experts, and are time-consuming and resource-intensive. Learning …
requirement of domain experts, and are time-consuming and resource-intensive. Learning …
Robust Testing of AI Language Model Resiliency with Novel Adversarial Prompts
B Hannon, Y Kumar, D Gayle, JJ Li, P Morreale - Electronics, 2024 - mdpi.com
In the rapidly advancing field of Artificial Intelligence (AI), this study presents a critical
evaluation of the resilience and cybersecurity efficacy of leading AI models, including …
evaluation of the resilience and cybersecurity efficacy of leading AI models, including …
Explainable machine learning for malware detection on android applications
C Palma, A Ferreira, M Figueiredo - Information, 2024 - mdpi.com
The presence of malicious software (malware), for example, in Android applications (apps),
has harmful or irreparable consequences to the user and/or the device. Despite the …
has harmful or irreparable consequences to the user and/or the device. Despite the …
Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline
L Alevizos, M Dekker - Electronics, 2024 - mdpi.com
Cyber threats continue to evolve in complexity, thereby traditional cyber threat intelligence
(CTI) methods struggle to keep pace. AI offers a potential solution, automating and …
(CTI) methods struggle to keep pace. AI offers a potential solution, automating and …
Machine Learning and Deep Learning Based Model for the Detection of Rootkits Using Memory Analysis
Rootkits are malicious programs designed to conceal their activities on compromised
systems, making them challenging to detect using conventional methods. As the threat …
systems, making them challenging to detect using conventional methods. As the threat …
IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets
The tremendous growth of the Internet of Things (IoT) has gained a lot of attention in the
global market. The massive deployment of IoT is also inherent in various security …
global market. The massive deployment of IoT is also inherent in various security …
SoK: Leveraging Transformers for Malware Analysis
The introduction of transformers has been an important breakthrough for AI research and
application as transformers are the foundation behind Generative AI. A promising …
application as transformers are the foundation behind Generative AI. A promising …