Machine learning in cybersecurity: A review
Machine learning technology has become mainstream in a large number of domains, and
cybersecurity applications of machine learning techniques are plenty. Examples include …
cybersecurity applications of machine learning techniques are plenty. Examples include …
Artificial intelligence and machine learning in cybersecurity: Applications, challenges, and opportunities for mis academics
The availability of massive amounts of data, fast computers, and superior machine learning
(ML) algorithms has spurred interest in artificial intelligence (AI). It is no surprise, then, that …
(ML) algorithms has spurred interest in artificial intelligence (AI). It is no surprise, then, that …
Adversarial examples for cnn-based malware detectors
B Chen, Z Ren, C Yu, I Hussain, J Liu - IEEE Access, 2019 - ieeexplore.ieee.org
The convolutional neural network (CNN)-based models have achieved tremendous
breakthroughs in many end-to-end applications, such as image identification, text …
breakthroughs in many end-to-end applications, such as image identification, text …
Evolution of malware and its detection techniques
In today's world, information is one of the most valuable assets, but there is a major threat to
it by the evolving second-generation sophisticated malware, because it can enter the …
it by the evolving second-generation sophisticated malware, because it can enter the …
A new malware detection system using machine learning techniques for API call sequences
MA Jerlin, K Marimuthu - Journal of Applied Security Research, 2018 - Taylor & Francis
The detection and classification of malwares in windows executables is an important and
demanding task in the field of data mining. The malwares can easily damage the system by …
demanding task in the field of data mining. The malwares can easily damage the system by …
An effective approach for classification of advanced malware with high accuracy
Combating malware is very important for software/systems security, but to prevent the
software/systems from the advanced malware, viz. metamorphic malware is a challenging …
software/systems from the advanced malware, viz. metamorphic malware is a challenging …
Web-based malware detection system using convolutional neural network
A Alqahtani, S Azzony, L Alsharafi, M Alaseri - Digital, 2023 - mdpi.com
In this article, we introduce a web-based malware detection system that leverages a deep-
learning approach. Our primary objective is the development of a robust deep-learning …
learning approach. Our primary objective is the development of a robust deep-learning …
Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS
Recurrent deep learning language models like the LSTM are often used to provide
advanced cyber-defense for high-value assets. The underlying assumption for using LSTM …
advanced cyber-defense for high-value assets. The underlying assumption for using LSTM …
Malware detection based on deep learning
L Alsharafi, M Asiri, S Azzony… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
In this article, we delve into the realm of malware detection, We've created an advanced
deep learning method designed to classify malicious software contained in an executable …
deep learning method designed to classify malicious software contained in an executable …
An investigation of the classifiers to detect android malicious apps
Android devices are growing exponentially and are connected through the Internet
accessing billion of online Websites. The popularity of these devices encourages malware …
accessing billion of online Websites. The popularity of these devices encourages malware …