Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …
security defenses to protect against them. The dynamic nature of new-generation threats …
A survey of android malware detection with deep neural models
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber
security research. Deep learning models have many advantages over traditional Machine …
security research. Deep learning models have many advantages over traditional Machine …
Software vulnerability detection using deep neural networks: a survey
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …
important concern in the software industry and in the field of cybersecurity, suggesting that …
Data-driven cybersecurity incident prediction: A survey
Driven by the increasing scale and high profile cybersecurity incidents related public data,
recent years we have witnessed a paradigm shift in understanding and defending against …
recent years we have witnessed a paradigm shift in understanding and defending against …
When does machine learning {FAIL}? generalized transferability for evasion and poisoning attacks
Recent results suggest that attacks against supervised machine learning systems are quite
effective, while defenses are easily bypassed by new attacks. However, the specifications for …
effective, while defenses are easily bypassed by new attacks. However, the specifications for …
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
To adapt to the rapidly evolving landscape of cyber threats, security professionals are
actively exchanging Indicators of Compromise (IOC)(eg, malware signatures, botnet IPs) …
actively exchanging Indicators of Compromise (IOC)(eg, malware signatures, botnet IPs) …
Empirical analysis of security vulnerabilities in python packages
Software ecosystems play an important role in modern software development, providing an
open platform of reusable packages that speed up and facilitate development tasks …
open platform of reusable packages that speed up and facilitate development tasks …
A survey on systems security metrics
M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …
systematically explored based on the understanding of attack-defense interactions, which …
Tiresias: Predicting security events through deep learning
With the increased complexity of modern computer attacks, there is a need for defenders not
only to detect malicious activity as it happens, but also to predict the specific steps that will …
only to detect malicious activity as it happens, but also to predict the specific steps that will …
Twitter spam detection: Survey of new approaches and comparative study
Twitter spam has long been a critical but difficult problem to be addressed. So far,
researchers have proposed many detection and defence methods in order to protect Twitter …
researchers have proposed many detection and defence methods in order to protect Twitter …