Artificial intelligence for cybersecurity: a systematic mapping of literature
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity
methods to be more robust and intelligent. This will make defense mechanisms to be …
methods to be more robust and intelligent. This will make defense mechanisms to be …
A systematic overview of the machine learning methods for mobile malware detection
Y Kim, JJ Lee, MH Go, HY Kang… - Security and …, 2022 - Wiley Online Library
With the deployment of the 5G cellular system, the upsurge of diverse mobile applications
and devices has increased the potential challenges and threats posed to users. Industry and …
and devices has increased the potential challenges and threats posed to users. Industry and …
Leveraging AI/ML for anomaly detection, threat prediction, and automated response.
OA Ajala - 2024 - preprints.org
The rapid evolution of information and communication technologies, notably the Internet,
has yielded substantial benefits while posing challenges to information system security. With …
has yielded substantial benefits while posing challenges to information system security. With …
Cyber security and the role of intelligent systems in addressing its challenges
We are living in a unique period of history, and the current technology revolution will be
among the most dramatic societal transformations remembered by humanity. The important …
among the most dramatic societal transformations remembered by humanity. The important …
Proposed framework for network lateral movement detection based on user risk scoring in siem
AAA Lah, RA Dziyauddin… - 2018 2nd International …, 2018 - ieeexplore.ieee.org
Network lateral movement or simply called lateral movement is the latest techniques used by
cyber attackers to progressively move through a network while they search and gathered …
cyber attackers to progressively move through a network while they search and gathered …
Effective Community Detection Over Streaming Bipartite Networks (Technical Report)
The streaming bipartite graph is extensively used to model the dynamic relationship
between two types of entities in many real-world applications, such as movie …
between two types of entities in many real-world applications, such as movie …
Co-similar malware infection patterns as a predictor of future risk
A Yavneh, R Lothan, D Yamin - PloS one, 2021 - journals.plos.org
The internet is flooded with malicious content that can come in various forms and lead to
information theft and monetary losses. From the ISP to the browser itself, many security …
information theft and monetary losses. From the ISP to the browser itself, many security …
Web security and vulnerability: A literature review
The web continues to grow and attacks against the web continue to increase. This paper
focuses on the literature review on scanning web vulnerabilities and solutions to mitigate …
focuses on the literature review on scanning web vulnerabilities and solutions to mitigate …
[PDF][PDF] Searching for the strong AI for cybersecurity
DE Vorobieva, AS Petrenko… - Proceedings of the XI …, 2021 - academia.edu
Currently, the creation of strong artificial intelligence (eng. Strong Artificial Intelligence (AI))
to ensure the required cybersecurity of digital platforms Industry 4.0 is one of the most …
to ensure the required cybersecurity of digital platforms Industry 4.0 is one of the most …
Artificial intelligence a human mind tool saving from cybercrimes and cyber threats
B Singh, R Choudhary, A Sharma… - International Journal of …, 2022 - indianjournals.com
Cyber security has become a major concern in the digital era. The breach in data, cracking
the captcha, identity theft, and other such offences has affected millions of peoples in their …
the captcha, identity theft, and other such offences has affected millions of peoples in their …