Unmasking cybercrime with artificial-intelligence-driven cybersecurity analytics

A Djenna, E Barka, A Benchikh, K Khadir - Sensors, 2023 - mdpi.com
Cybercriminals are becoming increasingly intelligent and aggressive, making them more
adept at covering their tracks, and the global epidemic of cybercrime necessitates significant …

An Overview of Malware Injection Attacks: Techniques, Impacts, and Countermeasures

R Madhvan, MF Zolkipli - Borneo International Journal eISSN 2636 …, 2023 - majmuah.com
With continuous advancement of technology, the frequency of malware injection attacks has
risen, posing significant risks to the security of computer systems and networks. This …

Deep learning-powered malware detection in cyberspace: a contemporary review

A Redhu, P Choudhary, K Srinivasan, TK Das - Frontiers in Physics, 2024 - frontiersin.org
This article explores deep learning models in the field of malware detection in cyberspace,
aiming to provide insights into their relevance and contributions. The primary objective of the …

[HTML][HTML] A novel machine learning approach for detecting first-time-appeared malware

K Shaukat, S Luo, V Varadharajan - Engineering Applications of Artificial …, 2024 - Elsevier
Conventional malware detection approaches have the overhead of feature extraction, the
requirement of domain experts, and are time-consuming and resource-intensive. Learning …

Robust Testing of AI Language Model Resiliency with Novel Adversarial Prompts

B Hannon, Y Kumar, D Gayle, JJ Li, P Morreale - Electronics, 2024 - mdpi.com
In the rapidly advancing field of Artificial Intelligence (AI), this study presents a critical
evaluation of the resilience and cybersecurity efficacy of leading AI models, including …

Explainable machine learning for malware detection on android applications

C Palma, A Ferreira, M Figueiredo - Information, 2024 - mdpi.com
The presence of malicious software (malware), for example, in Android applications (apps),
has harmful or irreparable consequences to the user and/or the device. Despite the …

Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline

L Alevizos, M Dekker - Electronics, 2024 - mdpi.com
Cyber threats continue to evolve in complexity, thereby traditional cyber threat intelligence
(CTI) methods struggle to keep pace. AI offers a potential solution, automating and …

Machine Learning and Deep Learning Based Model for the Detection of Rootkits Using Memory Analysis

B Noor, S Qadir - Applied Sciences, 2023 - mdpi.com
Rootkits are malicious programs designed to conceal their activities on compromised
systems, making them challenging to detect using conventional methods. As the threat …

IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets

U Garg, S Kumar, A Mahanti - Future Internet, 2024 - mdpi.com
The tremendous growth of the Internet of Things (IoT) has gained a lot of attention in the
global market. The massive deployment of IoT is also inherent in various security …

SoK: Leveraging Transformers for Malware Analysis

P Kunwar, K Aryal, M Gupta, M Abdelsalam… - arXiv preprint arXiv …, 2024 - arxiv.org
The introduction of transformers has been an important breakthrough for AI research and
application as transformers are the foundation behind Generative AI. A promising …