A survey of android malware detection with deep neural models
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber
security research. Deep learning models have many advantages over traditional Machine …
security research. Deep learning models have many advantages over traditional Machine …
A review of android malware detection approaches based on machine learning
K Liu, S Xu, G Xu, M Zhang, D Sun, H Liu - IEEE access, 2020 - ieeexplore.ieee.org
Android applications are developing rapidly across the mobile ecosystem, but Android
malware is also emerging in an endless stream. Many researchers have studied the …
malware is also emerging in an endless stream. Many researchers have studied the …
Dos and don'ts of machine learning in computer security
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …
massive datasets, machine learning algorithms have led to major breakthroughs in many …
The role of machine learning in cybersecurity
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …
systems, and many domains already leverage the capabilities of ML. However, deployment …
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …
been remarkable. Deep learning, in particular, has been extensively used to drive …
A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
As the number of Internet-connected systems rises, cyber analysts find it increasingly difficult
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …
to effectively monitor the produced volume of data, its velocity and diversity. Signature-based …
A comprehensive survey of recent internet measurement techniques for cyber security
MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Intriguing properties of adversarial ml attacks in the problem space
Recent research efforts on adversarial ML have investigated problem-space attacks,
focusing on the generation of real evasive objects in domains where, unlike images, there is …
focusing on the generation of real evasive objects in domains where, unlike images, there is …
[HTML][HTML] MalDozer: Automatic framework for android malware detection using deep learning
Android OS experiences a blazing popularity since the last few years. This predominant
platform has established itself not only in the mobile world but also in the Internet of Things …
platform has established itself not only in the mobile world but also in the Internet of Things …
Intelligent mobile malware detection using permission requests and API calls
Malware is a serious threat that has been used to target mobile devices since its inception.
Two types of mobile malware attacks are standalone: fraudulent mobile apps and injected …
Two types of mobile malware attacks are standalone: fraudulent mobile apps and injected …