Malware detection with artificial intelligence: A systematic literature review
In this survey, we review the key developments in the field of malware detection using AI and
analyze core challenges. We systematically survey state-of-the-art methods across five …
analyze core challenges. We systematically survey state-of-the-art methods across five …
[图书][B] Introduction to machine learning with applications in information security
M Stamp - 2022 - taylorfrancis.com
Introduction to Machine Learning with Applications in Information Security, Second Edition
provides a classroom-tested introduction to a wide variety of machine learning and deep …
provides a classroom-tested introduction to a wide variety of machine learning and deep …
An automated vision-based deep learning model for efficient detection of android malware attacks
Recently, cybersecurity experts and researchers have given special attention to developing
cost-effective deep learning (DL)-based algorithms for Android malware detection (AMD) …
cost-effective deep learning (DL)-based algorithms for Android malware detection (AMD) …
AI-based ransomware detection: A comprehensive review
Ransomware attacks are becoming increasingly sophisticated, thereby rendering
conventional detection methods less effective. Recognizing this challenge, this study …
conventional detection methods less effective. Recognizing this challenge, this study …
Visualized malware multi-classification framework using fine-tuned CNN-based transfer learning models
There is a massive growth in malicious software (Malware) development, which causes
substantial security threats to individuals and organizations. Cybersecurity researchers …
substantial security threats to individuals and organizations. Cybersecurity researchers …
Let the cat out of the bag: Popular android iot apps under security scrutiny
The impact that IoT technologies have on our everyday life is indisputable. Wearables, smart
appliances, lighting, security controls, and others make our life simpler and more …
appliances, lighting, security controls, and others make our life simpler and more …
Digital forensics for malware classification: An approach for binary code to pixel vector transition
The most often reported danger to computer security is malware. Antivirus company AV‐Test
Institute reports that more than 5 million malware samples are created each day. A malware …
Institute reports that more than 5 million malware samples are created each day. A malware …
A proposed new endpoint detection and response with image-based malware detection system
TH Hai, V Van Thieu, TT Duong, HH Nguyen… - IEEE …, 2023 - ieeexplore.ieee.org
Due to increased reliance on technology and cloud-based services, cyber risks are more
common. Advanced persistent threats make it difficult to detect attacks, hence Endpoint …
common. Advanced persistent threats make it difficult to detect attacks, hence Endpoint …
Motion capture and evaluation system of football special teaching in colleges and universities based on deep learning
X Yin, CC Vignesh, T Vadivel - International Journal of System Assurance …, 2022 - Springer
Football reduces body fat and increases the tone of muscle, constructs strength, flexibility,
and stamina. It increases muscle power, bone as well as improvements in walking, running …
and stamina. It increases muscle power, bone as well as improvements in walking, running …
Deep learning approach to security enforcement in cloud workflow orchestration
HT El-Kassabi, MA Serhani, MM Masud… - Journal of Cloud …, 2023 - Springer
Supporting security and data privacy in cloud workflows has attracted significant research
attention. For example, private patients' data managed by a workflow deployed on the cloud …
attention. For example, private patients' data managed by a workflow deployed on the cloud …