Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …
This resulted into both human and financial losses at all IoT levels especially individual and …
[图书][B] Cyber threat intelligence: challenges and opportunities
The ever increasing number of cyber attacks requires the cyber security and forensic
specialists to detect, analyze and defend against the cyber threats in almost real-time. In …
specialists to detect, analyze and defend against the cyber threats in almost real-time. In …
A survey on machine learning techniques for cyber security in the last decade
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
An effective genetic algorithm-based feature selection method for intrusion detection systems
Availability of suitable and validated data is a key issue in multiple domains for
implementing machine learning methods. Higher data dimensionality has adverse effects on …
implementing machine learning methods. Higher data dimensionality has adverse effects on …
{Explanation-Guided} backdoor poisoning attacks against malware classifiers
Training pipelines for machine learning (ML) based malware classification often rely on
crowdsourced threat feeds, exposing a natural attack injection point. In this paper, we study …
crowdsourced threat feeds, exposing a natural attack injection point. In this paper, we study …
Fuzzy pattern tree for edge malware detection and categorization in IoT
EM Dovom, A Azmoodeh, A Dehghantanha… - Journal of Systems …, 2019 - Elsevier
The surging pace of Internet of Things (IoT) development and its applications has resulted in
significantly large amounts of data (commonly known as big data) being communicated and …
significantly large amounts of data (commonly known as big data) being communicated and …
Byte-level malware classification based on markov images and deep learning
B Yuan, J Wang, D Liu, W Guo, P Wu, X Bao - Computers & Security, 2020 - Elsevier
In recent years, malware attacks have become serious security threats and have caused
huge losses. Due to the rapid growth of malware variants, how to quickly and accurately …
huge losses. Due to the rapid growth of malware variants, how to quickly and accurately …
Graph neural networks for intrusion detection: A survey
T Bilot, N El Madhoun, K Al Agha, A Zouaoui - IEEE Access, 2023 - ieeexplore.ieee.org
Cyberattacks represent an ever-growing threat that has become a real priority for most
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …
An improved two-hidden-layer extreme learning machine for malware hunting
Detecting unknown malware and their variants remains both an operational challenge and a
research challenge. In recent years, there have been attempts to design machine learning …
research challenge. In recent years, there have been attempts to design machine learning …
A multi-perspective malware detection approach through behavioral fusion of api call sequence
E Amer, I Zelinka, S El-Sappagh - Computers & Security, 2021 - Elsevier
The widespread development of the malware industry is considered the main threat to our e-
society. Therefore, malware analysis should also be enriched with smart heuristic tools that …
society. Therefore, malware analysis should also be enriched with smart heuristic tools that …