Utilizing cyber threat hunting techniques to find ransomware attacks: A survey of the state of the art
F Aldauiji, O Batarfi, M Bayousef - IEEE Access, 2022 - ieeexplore.ieee.org
Ransomware is one of the most harmful types of cyber attacks that cause major concerns on
a global scale. It makes the victims' resources unusable by encrypting data or locking …
a global scale. It makes the victims' resources unusable by encrypting data or locking …
A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems
Cybersecurity incident response is a very crucial part of the cybersecurity management
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …
system. Adversaries emerge and evolve with new cybersecurity tactics, techniques, and …
[HTML][HTML] Accurate threat hunting in industrial internet of things edge devices
Abstract Industrial Internet of Things (IIoT) systems depend on a growing number of edge
devices such as sensors, controllers, and robots for data collection, transmission, storage …
devices such as sensors, controllers, and robots for data collection, transmission, storage …
Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model
Smart cities have attracted a lot of attention from interdisciplinary research, and plenty of
artificial intelligence based solutions have been proposed. However, cyber security has …
artificial intelligence based solutions have been proposed. However, cyber security has …
AI4SAFE-IoT: An AI-powered secure architecture for edge layer of Internet of things
With the increasing use of the Internet of things (IoT) in diverse domains, security concerns
and IoT threats are constantly rising. The computational and memory limitations of IoT …
and IoT threats are constantly rising. The computational and memory limitations of IoT …
A multi-view feature fusion approach for effective malware classification using Deep Learning
The number of malware infected machines from all over the world has been growing day by
day. New malware variants appear in the wild to evade the malware detection and …
day. New malware variants appear in the wild to evade the malware detection and …
A threat hunting framework for industrial control systems
Z Jadidi, Y Lu - IEEE Access, 2021 - ieeexplore.ieee.org
An Industrial Control System (ICS) adversary often takes different actions to exploit
vulnerabilities, pass the border between Information Technology (IT) and Operational …
vulnerabilities, pass the border between Information Technology (IT) and Operational …
Deep learning-enabled threat intelligence scheme in the internet of things networks
With the prevalence of Internet of Things (IoT) systems, there should be a resilient
connection between Space, Air, Ground, and Sea (SAGS) networks to offer automated …
connection between Space, Air, Ground, and Sea (SAGS) networks to offer automated …
MVFCC: A multi-view fuzzy consensus clustering model for malware threat attribution
The rise of emerging cyberthreats has led to a shift of focus on identifying the source of
threat instead of the type of attack to provide a more effective defense to compromised …
threat instead of the type of attack to provide a more effective defense to compromised …
xr-droid: A Benchmark Dataset for AR/VR and Security Applications
A Alghamdi, A Alkinoon, A Alghuried… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The development of metaverses and virtual worlds on various platforms, including mobile
devices, has led to the growth of applications in virtual reality (VR) and augmented reality …
devices, has led to the growth of applications in virtual reality (VR) and augmented reality …