Utilizing cyber threat hunting techniques to find ransomware attacks: A survey of the state of the art

F Aldauiji, O Batarfi, M Bayousef - IEEE Access, 2022 - ieeexplore.ieee.org
Ransomware is one of the most harmful types of cyber attacks that cause major concerns on
a global scale. It makes the victims' resources unusable by encrypting data or locking …

A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems

M Imran, HUR Siddiqui, A Raza, MA Raza… - Computers & …, 2023 - Elsevier
Cybersecurity incident response is a very crucial part of the cybersecurity management
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …

[HTML][HTML] Accurate threat hunting in industrial internet of things edge devices

A Yazdinejad, B Zolfaghari, A Dehghantanha… - Digital Communications …, 2023 - Elsevier
Abstract Industrial Internet of Things (IIoT) systems depend on a growing number of edge
devices such as sensors, controllers, and robots for data collection, transmission, storage …

Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model

Y Jia, Z Gu, L Du, Y Long, Y Wang, J Li… - Knowledge-Based …, 2023 - Elsevier
Smart cities have attracted a lot of attention from interdisciplinary research, and plenty of
artificial intelligence based solutions have been proposed. However, cyber security has …

AI4SAFE-IoT: An AI-powered secure architecture for edge layer of Internet of things

H HaddadPajouh, R Khayami, A Dehghantanha… - Neural Computing and …, 2020 - Springer
With the increasing use of the Internet of things (IoT) in diverse domains, security concerns
and IoT threats are constantly rising. The computational and memory limitations of IoT …

A multi-view feature fusion approach for effective malware classification using Deep Learning

R Chaganti, V Ravi, TD Pham - Journal of information security and …, 2023 - Elsevier
The number of malware infected machines from all over the world has been growing day by
day. New malware variants appear in the wild to evade the malware detection and …

A threat hunting framework for industrial control systems

Z Jadidi, Y Lu - IEEE Access, 2021 - ieeexplore.ieee.org
An Industrial Control System (ICS) adversary often takes different actions to exploit
vulnerabilities, pass the border between Information Technology (IT) and Operational …

Deep learning-enabled threat intelligence scheme in the internet of things networks

M Al-Hawawreh, N Moustafa, S Garg… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the prevalence of Internet of Things (IoT) systems, there should be a resilient
connection between Space, Air, Ground, and Sea (SAGS) networks to offer automated …

MVFCC: A multi-view fuzzy consensus clustering model for malware threat attribution

H Haddadpajouh, A Azmoodeh, A Dehghantanha… - IEEE …, 2020 - ieeexplore.ieee.org
The rise of emerging cyberthreats has led to a shift of focus on identifying the source of
threat instead of the type of attack to provide a more effective defense to compromised …

xr-droid: A Benchmark Dataset for AR/VR and Security Applications

A Alghamdi, A Alkinoon, A Alghuried… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The development of metaverses and virtual worlds on various platforms, including mobile
devices, has led to the growth of applications in virtual reality (VR) and augmented reality …