Machine learning techniques applied to cybersecurity
J Martínez Torres, C Iglesias Comesaña… - International Journal of …, 2019 - Springer
Abstract Machine learning techniques are a set of mathematical models to solve high non-
linearity problems of different topics: prediction, classification, data association, data …
linearity problems of different topics: prediction, classification, data association, data …
Smartphone malware and its propagation modeling: A survey
S Peng, S Yu, A Yang - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
Smartphones are pervasively used in society, and have been both the target and victim of
malware writers. Motivated by the significant threat that presents to legitimate users, we …
malware writers. Motivated by the significant threat that presents to legitimate users, we …
Intelligent vision-based malware detection and classification using deep random forest paradigm
Malware is a rapidly increasing menace to modern computing. Malware authors continually
incorporate various sophisticated features like code obfuscations to create malware variants …
incorporate various sophisticated features like code obfuscations to create malware variants …
Generalized epidemic mean-field model for spreading processes over multilayer complex networks
Mean-field deterministic epidemic models have been successful in uncovering several
important dynamic properties of stochastic epidemic spreading processes over complex …
important dynamic properties of stochastic epidemic spreading processes over complex …
Modeling the propagation of worms in networks: A survey
There are the two common means for propagating worms: scanning vulnerable computers in
the network and spreading through topological neighbors. Modeling the propagation of …
the network and spreading through topological neighbors. Modeling the propagation of …
A sword with two edges: Propagation studies on both positive and negative information in online social networks
Online social networks (OSN) have become one of the major platforms for people to
exchange information. Both positive information (eg, ideas, news and opinions) and …
exchange information. Both positive information (eg, ideas, news and opinions) and …
To shut them up or to clarify: Restraining the spread of rumors in online social networks
Restraining the spread of rumors in online social networks (OSNs) has long been an
important but difficult problem to be addressed. Currently, there are mainly two types of …
important but difficult problem to be addressed. Currently, there are mainly two types of …
[HTML][HTML] IoTSecSim: A framework for modelling and simulation of security in Internet of things
The proliferation of the Internet of Things (IoT) devices has provided attackers with
tremendous opportunities to launch various cyber-attacks. It has been challenging to …
tremendous opportunities to launch various cyber-attacks. It has been challenging to …
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives
The past decade has seen a rapidly growing interest in IoT-connected devices. But as is
usually the case with computer systems and networks, malicious individuals soon realized …
usually the case with computer systems and networks, malicious individuals soon realized …
Modeling propagation dynamics of social network worms
Social network worms, such as email worms and facebook worms, pose a critical security
threat to the Internet. Modeling their propagation dynamics is essential to predict their …
threat to the Internet. Modeling their propagation dynamics is essential to predict their …