Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman, A Chehab - Internet of Things, 2022 - Elsevier
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …

[图书][B] Cyber threat intelligence: challenges and opportunities

M Conti, T Dargahi, A Dehghantanha - 2018 - Springer
The ever increasing number of cyber attacks requires the cyber security and forensic
specialists to detect, analyze and defend against the cyber threats in almost real-time. In …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

An effective genetic algorithm-based feature selection method for intrusion detection systems

Z Halim, MN Yousaf, M Waqas, M Sulaiman… - Computers & …, 2021 - Elsevier
Availability of suitable and validated data is a key issue in multiple domains for
implementing machine learning methods. Higher data dimensionality has adverse effects on …

{Explanation-Guided} backdoor poisoning attacks against malware classifiers

G Severi, J Meyer, S Coull, A Oprea - 30th USENIX security symposium …, 2021 - usenix.org
Training pipelines for machine learning (ML) based malware classification often rely on
crowdsourced threat feeds, exposing a natural attack injection point. In this paper, we study …

Fuzzy pattern tree for edge malware detection and categorization in IoT

EM Dovom, A Azmoodeh, A Dehghantanha… - Journal of Systems …, 2019 - Elsevier
The surging pace of Internet of Things (IoT) development and its applications has resulted in
significantly large amounts of data (commonly known as big data) being communicated and …

Byte-level malware classification based on markov images and deep learning

B Yuan, J Wang, D Liu, W Guo, P Wu, X Bao - Computers & Security, 2020 - Elsevier
In recent years, malware attacks have become serious security threats and have caused
huge losses. Due to the rapid growth of malware variants, how to quickly and accurately …

Graph neural networks for intrusion detection: A survey

T Bilot, N El Madhoun, K Al Agha, A Zouaoui - IEEE Access, 2023 - ieeexplore.ieee.org
Cyberattacks represent an ever-growing threat that has become a real priority for most
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …

An improved two-hidden-layer extreme learning machine for malware hunting

AN Jahromi, S Hashemi, A Dehghantanha… - Computers & …, 2020 - Elsevier
Detecting unknown malware and their variants remains both an operational challenge and a
research challenge. In recent years, there have been attempts to design machine learning …

A multi-perspective malware detection approach through behavioral fusion of api call sequence

E Amer, I Zelinka, S El-Sappagh - Computers & Security, 2021 - Elsevier
The widespread development of the malware industry is considered the main threat to our e-
society. Therefore, malware analysis should also be enriched with smart heuristic tools that …