Classification of ransomware families with machine learning based onN-gram of opcodes

H Zhang, X Xiao, F Mercaldo, S Ni, F Martinelli… - Future Generation …, 2019 - Elsevier
Ransomware is a special type of malware that can lock victims' screen and/or encrypt their
files to obtain ransoms, resulting in great damage to users. Mapping ransomware into …

Fuzzy pattern tree for edge malware detection and categorization in IoT

EM Dovom, A Azmoodeh, A Dehghantanha… - Journal of Systems …, 2019 - Elsevier
The surging pace of Internet of Things (IoT) development and its applications has resulted in
significantly large amounts of data (commonly known as big data) being communicated and …

Leveraging machine learning techniques for windows ransomware network traffic detection

OMK Alhawi, J Baldwin, A Dehghantanha - Cyber threat intelligence, 2018 - Springer
Ransomware has become a significant global threat with the ransomware-as-a-service
model enabling easy availability and deployment, and the potential for high revenues …

[HTML][HTML] A multi-tiered feature selection model for android malware detection based on Feature discrimination and Information Gain

P Bhat, K Dutta - Journal of King Saud University-Computer and …, 2022 - Elsevier
With the rise in popularity and its open system architecture, Android has become vulnerable
to malicious attacks. There are several malware detection approaches available to fortify the …

Observability in kubernetes cluster: Automatic anomalies detection using prometheus

O Mart, C Negru, F Pop… - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
Kubernetes is a portable, extensible, open-source platform for managing containers. It
comes with features such as automatic scaling, service discovery, load balancing, fault …

Emerging from the cloud: A bibliometric analysis of cloud forensics studies

J Baldwin, OMK Alhawi, S Shaughnessy, A Akinbi… - Cyber threat …, 2018 - Springer
Emergence of cloud computing technologies have changed the way we store, retrieve, and
archive our data. With the promise of unlimited, reliable and always-available storage, a lot …

Mobile forensics: A bibliometric analysis

J Gill, I Okere, H HaddadPajouh… - Cyber Threat …, 2018 - Springer
In the past few years mobile devices have advanced in a variety of ways such as internal
power source capacity, internal memory storage, and CPU capabilities thereby increasing …

A model for android and ios applications risk calculation: Cvss analysis and enhancement using case-control studies

M Petraityte, A Dehghantanha, G Epiphaniou - Cyber Threat Intelligence, 2018 - Springer
Various researchers have shown that the Common Vulnerability Scoring System (CVSS)
has many drawbacks and may not provide a precise view of the risks related to software …