Machine learning techniques applied to cybersecurity
J Martínez Torres, C Iglesias Comesaña… - International Journal of …, 2019 - Springer
Abstract Machine learning techniques are a set of mathematical models to solve high non-
linearity problems of different topics: prediction, classification, data association, data …
linearity problems of different topics: prediction, classification, data association, data …
Malicious application detection in android—a systematic literature review
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …
gadgets became an essential necessity of day-to-day life. People are using new …
AdMat: A CNN-on-matrix approach to Android malware detection and classification
The availability of big data and affordable hardware have enabled the applications of deep
learning on different tasks. With respect to security, several attempts have been made to …
learning on different tasks. With respect to security, several attempts have been made to …
Comprehensive review and analysis of anti-malware apps for smartphones
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …
largely scattered. The available options and gaps in this research area must be analysed to …
A survey on smartphones security: software vulnerabilities, malware, and attacks
Nowadays, the usage of smartphones and their applications have become rapidly
increasing popular in people's daily life. Over the last decade, availability of mobile money …
increasing popular in people's daily life. Over the last decade, availability of mobile money …
Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation)
Android is a free open-source operating system (OS), which allows an in-depth
understanding of its architecture. Therefore, many manufacturers are utilizing this OS to …
understanding of its architecture. Therefore, many manufacturers are utilizing this OS to …
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow
Technologies for integrating enterprise web applications have improved rapidly over the
years. The OAuth framework provides authentication and authorization using the users' …
years. The OAuth framework provides authentication and authorization using the users' …
[PDF][PDF] Artificially intelligent cyberattacks
E Zouave, M Bruce, K Colde, M Jaitner, I Rodhe… - … FOI [Online] Available …, 2020 - uu.se
This report explores the possibilities and applications of artificial intelligence (AI) within the
various stages of a cyberattack. It is a literature review of the current state of the art in AI …
various stages of a cyberattack. It is a literature review of the current state of the art in AI …
Calibrating Network Traffic with One‐Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware …
S Wei, Z Zhang, S Li, P Jiang - Security and Communication …, 2021 - Wiley Online Library
In response to the surging challenge in the number and types of mobile malware targeting
smart devices and their sophistication in malicious behavior camouflage, we propose to …
smart devices and their sophistication in malicious behavior camouflage, we propose to …
Ensemble machine learning approach for android malware classification using hybrid features
A Pektaş, T Acarman - Proceedings of the 10th International Conference …, 2018 - Springer
Feature-based learning plays a crucial role at building and sustaining the security.
Determination of a software based on its extracted features whether a benign or malign …
Determination of a software based on its extracted features whether a benign or malign …