Classification of ransomware families with machine learning based onN-gram of opcodes
Ransomware is a special type of malware that can lock victims' screen and/or encrypt their
files to obtain ransoms, resulting in great damage to users. Mapping ransomware into …
files to obtain ransoms, resulting in great damage to users. Mapping ransomware into …
Fuzzy pattern tree for edge malware detection and categorization in IoT
EM Dovom, A Azmoodeh, A Dehghantanha… - Journal of Systems …, 2019 - Elsevier
The surging pace of Internet of Things (IoT) development and its applications has resulted in
significantly large amounts of data (commonly known as big data) being communicated and …
significantly large amounts of data (commonly known as big data) being communicated and …
Leveraging machine learning techniques for windows ransomware network traffic detection
OMK Alhawi, J Baldwin, A Dehghantanha - Cyber threat intelligence, 2018 - Springer
Ransomware has become a significant global threat with the ransomware-as-a-service
model enabling easy availability and deployment, and the potential for high revenues …
model enabling easy availability and deployment, and the potential for high revenues …
[HTML][HTML] A multi-tiered feature selection model for android malware detection based on Feature discrimination and Information Gain
With the rise in popularity and its open system architecture, Android has become vulnerable
to malicious attacks. There are several malware detection approaches available to fortify the …
to malicious attacks. There are several malware detection approaches available to fortify the …
Observability in kubernetes cluster: Automatic anomalies detection using prometheus
Kubernetes is a portable, extensible, open-source platform for managing containers. It
comes with features such as automatic scaling, service discovery, load balancing, fault …
comes with features such as automatic scaling, service discovery, load balancing, fault …
Emerging from the cloud: A bibliometric analysis of cloud forensics studies
J Baldwin, OMK Alhawi, S Shaughnessy, A Akinbi… - Cyber threat …, 2018 - Springer
Emergence of cloud computing technologies have changed the way we store, retrieve, and
archive our data. With the promise of unlimited, reliable and always-available storage, a lot …
archive our data. With the promise of unlimited, reliable and always-available storage, a lot …
Mobile forensics: A bibliometric analysis
J Gill, I Okere, H HaddadPajouh… - Cyber Threat …, 2018 - Springer
In the past few years mobile devices have advanced in a variety of ways such as internal
power source capacity, internal memory storage, and CPU capabilities thereby increasing …
power source capacity, internal memory storage, and CPU capabilities thereby increasing …
A model for android and ios applications risk calculation: Cvss analysis and enhancement using case-control studies
M Petraityte, A Dehghantanha, G Epiphaniou - Cyber Threat Intelligence, 2018 - Springer
Various researchers have shown that the Common Vulnerability Scoring System (CVSS)
has many drawbacks and may not provide a precise view of the risks related to software …
has many drawbacks and may not provide a precise view of the risks related to software …