Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

A survey of android malware detection with deep neural models

J Qiu, J Zhang, W Luo, L Pan, S Nepal… - ACM Computing Surveys …, 2020 - dl.acm.org
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber
security research. Deep learning models have many advantages over traditional Machine …

Software vulnerability detection using deep neural networks: a survey

G Lin, S Wen, QL Han, J Zhang… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …

Data-driven cybersecurity incident prediction: A survey

N Sun, J Zhang, P Rimba, S Gao… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Driven by the increasing scale and high profile cybersecurity incidents related public data,
recent years we have witnessed a paradigm shift in understanding and defending against …

When does machine learning {FAIL}? generalized transferability for evasion and poisoning attacks

O Suciu, R Marginean, Y Kaya, H Daume III… - 27th USENIX Security …, 2018 - usenix.org
Recent results suggest that attacks against supervised machine learning systems are quite
effective, while defenses are easily bypassed by new attacks. However, the specifications for …

Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence

X Liao, K Yuan, XF Wang, Z Li, L Xing… - Proceedings of the 2016 …, 2016 - dl.acm.org
To adapt to the rapidly evolving landscape of cyber threats, security professionals are
actively exchanging Indicators of Compromise (IOC)(eg, malware signatures, botnet IPs) …

Empirical analysis of security vulnerabilities in python packages

M Alfadel, DE Costa, E Shihab - Empirical Software Engineering, 2023 - Springer
Software ecosystems play an important role in modern software development, providing an
open platform of reusable packages that speed up and facilitate development tasks …

A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

Tiresias: Predicting security events through deep learning

Y Shen, E Mariconti, PA Vervier… - Proceedings of the 2018 …, 2018 - dl.acm.org
With the increased complexity of modern computer attacks, there is a need for defenders not
only to detect malicious activity as it happens, but also to predict the specific steps that will …

Twitter spam detection: Survey of new approaches and comparative study

T Wu, S Wen, Y Xiang, W Zhou - Computers & Security, 2018 - Elsevier
Twitter spam has long been a critical but difficult problem to be addressed. So far,
researchers have proposed many detection and defence methods in order to protect Twitter …