Machine learning techniques applied to cybersecurity

J Martínez Torres, C Iglesias Comesaña… - International Journal of …, 2019 - Springer
Abstract Machine learning techniques are a set of mathematical models to solve high non-
linearity problems of different topics: prediction, classification, data association, data …

Smartphone malware and its propagation modeling: A survey

S Peng, S Yu, A Yang - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
Smartphones are pervasively used in society, and have been both the target and victim of
malware writers. Motivated by the significant threat that presents to legitimate users, we …

Intelligent vision-based malware detection and classification using deep random forest paradigm

SA Roseline, S Geetha, S Kadry, Y Nam - IEEE Access, 2020 - ieeexplore.ieee.org
Malware is a rapidly increasing menace to modern computing. Malware authors continually
incorporate various sophisticated features like code obfuscations to create malware variants …

Generalized epidemic mean-field model for spreading processes over multilayer complex networks

FD Sahneh, C Scoglio… - IEEE/ACM Transactions …, 2013 - ieeexplore.ieee.org
Mean-field deterministic epidemic models have been successful in uncovering several
important dynamic properties of stochastic epidemic spreading processes over complex …

Modeling the propagation of worms in networks: A survey

Y Wang, S Wen, Y Xiang, W Zhou - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
There are the two common means for propagating worms: scanning vulnerable computers in
the network and spreading through topological neighbors. Modeling the propagation of …

A sword with two edges: Propagation studies on both positive and negative information in online social networks

S Wen, MS Haghighi, C Chen, Y Xiang… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
Online social networks (OSN) have become one of the major platforms for people to
exchange information. Both positive information (eg, ideas, news and opinions) and …

To shut them up or to clarify: Restraining the spread of rumors in online social networks

S Wen, J Jiang, Y Xiang, S Yu… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Restraining the spread of rumors in online social networks (OSNs) has long been an
important but difficult problem to be addressed. Currently, there are mainly two types of …

[HTML][HTML] IoTSecSim: A framework for modelling and simulation of security in Internet of things

KO Chee, M Ge, G Bai, DD Kim - Computers & Security, 2024 - Elsevier
The proliferation of the Internet of Things (IoT) devices has provided attackers with
tremendous opportunities to launch various cyber-attacks. It has been challenging to …

The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives

B Vignau, R Khoury, S Hallé, A Hamou-Lhadj - Journal of Systems …, 2021 - Elsevier
The past decade has seen a rapidly growing interest in IoT-connected devices. But as is
usually the case with computer systems and networks, malicious individuals soon realized …

Modeling propagation dynamics of social network worms

S Wen, W Zhou, J Zhang, Y Xiang… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Social network worms, such as email worms and facebook worms, pose a critical security
threat to the Internet. Modeling their propagation dynamics is essential to predict their …