Malware detection with artificial intelligence: A systematic literature review

MG Gaber, M Ahmed, H Janicke - ACM Computing Surveys, 2024 - dl.acm.org
In this survey, we review the key developments in the field of malware detection using AI and
analyze core challenges. We systematically survey state-of-the-art methods across five …

[图书][B] Introduction to machine learning with applications in information security

M Stamp - 2022 - taylorfrancis.com
Introduction to Machine Learning with Applications in Information Security, Second Edition
provides a classroom-tested introduction to a wide variety of machine learning and deep …

An automated vision-based deep learning model for efficient detection of android malware attacks

I Almomani, A Alkhayer, W El-Shafai - IEEE Access, 2022 - ieeexplore.ieee.org
Recently, cybersecurity experts and researchers have given special attention to developing
cost-effective deep learning (DL)-based algorithms for Android malware detection (AMD) …

AI-based ransomware detection: A comprehensive review

J Ferdous, R Islam, A Mahboubi, MZ Islam - IEEE Access, 2024 - ieeexplore.ieee.org
Ransomware attacks are becoming increasingly sophisticated, thereby rendering
conventional detection methods less effective. Recognizing this challenge, this study …

Visualized malware multi-classification framework using fine-tuned CNN-based transfer learning models

W El-Shafai, I Almomani, A AlKhayer - Applied Sciences, 2021 - mdpi.com
There is a massive growth in malicious software (Malware) development, which causes
substantial security threats to individuals and organizations. Cybersecurity researchers …

Let the cat out of the bag: Popular android iot apps under security scrutiny

E Chatzoglou, G Kambourakis, C Smiliotopoulos - Sensors, 2022 - mdpi.com
The impact that IoT technologies have on our everyday life is indisputable. Wearables, smart
appliances, lighting, security controls, and others make our life simpler and more …

Digital forensics for malware classification: An approach for binary code to pixel vector transition

MR Naeem, R Amin, SS Alshamrani… - Computational …, 2022 - Wiley Online Library
The most often reported danger to computer security is malware. Antivirus company AV‐Test
Institute reports that more than 5 million malware samples are created each day. A malware …

A proposed new endpoint detection and response with image-based malware detection system

TH Hai, V Van Thieu, TT Duong, HH Nguyen… - IEEE …, 2023 - ieeexplore.ieee.org
Due to increased reliance on technology and cloud-based services, cyber risks are more
common. Advanced persistent threats make it difficult to detect attacks, hence Endpoint …

Motion capture and evaluation system of football special teaching in colleges and universities based on deep learning

X Yin, CC Vignesh, T Vadivel - International Journal of System Assurance …, 2022 - Springer
Football reduces body fat and increases the tone of muscle, constructs strength, flexibility,
and stamina. It increases muscle power, bone as well as improvements in walking, running …

Deep learning approach to security enforcement in cloud workflow orchestration

HT El-Kassabi, MA Serhani, MM Masud… - Journal of Cloud …, 2023 - Springer
Supporting security and data privacy in cloud workflows has attracted significant research
attention. For example, private patients' data managed by a workflow deployed on the cloud …