A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
A survey of adversarial attack and defense methods for malware classification in cyber security
Malware poses a severe threat to cyber security. Attackers use malware to achieve their
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
malicious purposes, such as unauthorized access, stealing confidential data, blackmailing …
Inadequacies of large language model benchmarks in the era of generative artificial intelligence
The rapid rise in popularity of Large Language Models (LLMs) with emerging capabilities
has spurred public curiosity to evaluate and compare different LLMs, leading many …
has spurred public curiosity to evaluate and compare different LLMs, leading many …
Dos and don'ts of machine learning in computer security
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …
massive datasets, machine learning algorithms have led to major breakthroughs in many …
Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware
Machine learning (ML) classifiers have been widely deployed to detect Android malware,
but at the same time the application of ML classifiers also faces an emerging problem. The …
but at the same time the application of ML classifiers also faces an emerging problem. The …
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle
O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021 - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
Android ransomware detection based on a hybrid evolutionary approach in the context of highly imbalanced data
In recent years, Ransomware has been a critical threat that attacks smartphones.
Ransomware is a kind of malware that blocks the mobile's system and prevents the user of …
Ransomware is a kind of malware that blocks the mobile's system and prevents the user of …
A Systematical and longitudinal study of evasive behaviors in windows malware
Malware is one of the prevalent security threats. Sandboxes and, more generally,
instrumented environments play a crucial role in dynamically analyzing malware samples …
instrumented environments play a crucial role in dynamically analyzing malware samples …
[HTML][HTML] A systematic literature review on windows malware detection: Techniques, research issues, and future directions
The aim of this systematic literature review (SLR) is to provide a comprehensive overview of
the current state of Windows malware detection techniques, research issues, and future …
the current state of Windows malware detection techniques, research issues, and future …
Obfuscation-resilient android malware analysis based on complementary features
Existing Android malware detection methods are usually hard to simultaneously resist
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …
various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an …