Machine learning in cybersecurity: A review

A Handa, A Sharma, SK Shukla - … Reviews: Data Mining and …, 2019 - Wiley Online Library
Machine learning technology has become mainstream in a large number of domains, and
cybersecurity applications of machine learning techniques are plenty. Examples include …

Artificial intelligence and machine learning in cybersecurity: Applications, challenges, and opportunities for mis academics

R Sen, G Heim, Q Zhu - … of the Association for Information Systems, 2022 - aisel.aisnet.org
The availability of massive amounts of data, fast computers, and superior machine learning
(ML) algorithms has spurred interest in artificial intelligence (AI). It is no surprise, then, that …

Adversarial examples for cnn-based malware detectors

B Chen, Z Ren, C Yu, I Hussain, J Liu - IEEE Access, 2019 - ieeexplore.ieee.org
The convolutional neural network (CNN)-based models have achieved tremendous
breakthroughs in many end-to-end applications, such as image identification, text …

Evolution of malware and its detection techniques

SK Sahay, A Sharma, H Rathore - Information and Communication …, 2020 - Springer
In today's world, information is one of the most valuable assets, but there is a major threat to
it by the evolving second-generation sophisticated malware, because it can enter the …

A new malware detection system using machine learning techniques for API call sequences

MA Jerlin, K Marimuthu - Journal of Applied Security Research, 2018 - Taylor & Francis
The detection and classification of malwares in windows executables is an important and
demanding task in the field of data mining. The malwares can easily damage the system by …

An effective approach for classification of advanced malware with high accuracy

A Sharma, SK Sahay - arXiv preprint arXiv:1606.06897, 2016 - arxiv.org
Combating malware is very important for software/systems security, but to prevent the
software/systems from the advanced malware, viz. metamorphic malware is a challenging …

Web-based malware detection system using convolutional neural network

A Alqahtani, S Azzony, L Alsharafi, M Alaseri - Digital, 2023 - mdpi.com
In this article, we introduce a web-based malware detection system that leverages a deep-
learning approach. Our primary objective is the development of a robust deep-learning …

Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS

M Sewak, SK Sahay, H Rathore - 2020 IEEE REGION 10 …, 2020 - ieeexplore.ieee.org
Recurrent deep learning language models like the LSTM are often used to provide
advanced cyber-defense for high-value assets. The underlying assumption for using LSTM …

Malware detection based on deep learning

L Alsharafi, M Asiri, S Azzony… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
In this article, we delve into the realm of malware detection, We've created an advanced
deep learning method designed to classify malicious software contained in an executable …

An investigation of the classifiers to detect android malicious apps

A Sharma, SK Sahay - Information and Communication Technology …, 2018 - Springer
Android devices are growing exponentially and are connected through the Internet
accessing billion of online Websites. The popularity of these devices encourages malware …