SoK: Leveraging Transformers for Malware Analysis

P Kunwar, K Aryal, M Gupta, M Abdelsalam… - arXiv preprint arXiv …, 2024 - arxiv.org
The introduction of transformers has been an important breakthrough for AI research and
application as transformers are the foundation behind Generative AI. A promising …

[PDF][PDF] Performance Evaluation of Deep Learning Techniques in The Detection of IOT Malware

AT Salim, BM Khammas - Iraqi Journal of Information and Communication …, 2023 - iasj.net
Internet of Things (IoT) equipment is rapidly being used in a variety of businesses and for a
variety of reasons (for example, sensing and collecting data from the environment in both …

[图书][B] Security Framework for The Internet of Things Applications

SA Hamad, QZ Sheng, WE Zhang - 2024 - books.google.com
The text highlights a comprehensive survey that focuses on all security aspects and
challenges facing the Internet of Things systems, including outsourcing techniques for partial …

[HTML][HTML] MDABP: a novel approach to detect cross-architecture IoT malware based on PaaS

Y Zhao, A Kuerban - Sensors, 2023 - mdpi.com
With the development of internet technology, the Internet of Things (IoT) has been widely
used in several aspects of human life. However, IoT devices are becoming more vulnerable …

Detecting Malware With Securedeep Accelerator via Processor Side-Channel Fingerprinting for Internet of Things

Z Li - 2023 - digitalcommons.odu.edu
Over the past few years, there has been a substantial increase in cyberattacks targeting
Internet of Things (IoT) devices, encompassing threats like botnets, ransomware, trojans, etc …