Machine learning techniques applied to cybersecurity

J Martínez Torres, C Iglesias Comesaña… - International Journal of …, 2019 - Springer
Abstract Machine learning techniques are a set of mathematical models to solve high non-
linearity problems of different topics: prediction, classification, data association, data …

Malicious application detection in android—a systematic literature review

T Sharma, D Rattan - Computer Science Review, 2021 - Elsevier
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …

AdMat: A CNN-on-matrix approach to Android malware detection and classification

LN Vu, S Jung - IEEE Access, 2021 - ieeexplore.ieee.org
The availability of big data and affordable hardware have enabled the applications of deep
learning on different tasks. With respect to security, several attempts have been made to …

Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

A survey on smartphones security: software vulnerabilities, malware, and attacks

MT Ahvanooey, Q Li, M Rabbani, AR Rajput - arXiv preprint arXiv …, 2020 - arxiv.org
Nowadays, the usage of smartphones and their applications have become rapidly
increasing popular in people's daily life. Over the last decade, availability of mobile money …

Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation)

R Jusoh, A Firdaus, S Anwar, MZ Osman… - PeerJ Computer …, 2021 - peerj.com
Android is a free open-source operating system (OS), which allows an in-depth
understanding of its architecture. Therefore, many manufacturers are utilizing this OS to …

Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow

K Munonye, M Péter - International Journal of Information Security, 2022 - Springer
Technologies for integrating enterprise web applications have improved rapidly over the
years. The OAuth framework provides authentication and authorization using the users' …

[PDF][PDF] Artificially intelligent cyberattacks

E Zouave, M Bruce, K Colde, M Jaitner, I Rodhe… - … FOI [Online] Available …, 2020 - uu.se
This report explores the possibilities and applications of artificial intelligence (AI) within the
various stages of a cyberattack. It is a literature review of the current state of the art in AI …

Calibrating Network Traffic with One‐Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware …

S Wei, Z Zhang, S Li, P Jiang - Security and Communication …, 2021 - Wiley Online Library
In response to the surging challenge in the number and types of mobile malware targeting
smart devices and their sophistication in malicious behavior camouflage, we propose to …

Ensemble machine learning approach for android malware classification using hybrid features

A Pektaş, T Acarman - Proceedings of the 10th International Conference …, 2018 - Springer
Feature-based learning plays a crucial role at building and sustaining the security.
Determination of a software based on its extracted features whether a benign or malign …