[HTML][HTML] A survey of IoT malware and detection methods based on static features
Due to a lack of security design as well as the specific characteristics of IoT devices such as
the heterogeneity of processor architecture, IoT malware detection has to deal with very …
the heterogeneity of processor architecture, IoT malware detection has to deal with very …
[HTML][HTML] Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review
IoT devices which include wireless sensors, software, actuators, and computer devices
operated through the Internet, enable the transfer of data among objects or people …
operated through the Internet, enable the transfer of data among objects or people …
Deep learning based cross architecture internet of things malware detection and classification
The number of publicly exposed Internet of Things (IoT) devices has been increasing, as
more number of these devices connected to the internet with default settings. The devices …
more number of these devices connected to the internet with default settings. The devices …
Malware detection on highly imbalanced data through sequence modeling
We explore the task of Android malware detection based on dynamic analysis of application
activity sequences using deep learning techniques. We show that analyzing a sequence of …
activity sequences using deep learning techniques. We show that analyzing a sequence of …
Recurrent neural network model for IoT and networking malware threat detection
M Woźniak, J Siłka, M Wieczorek… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Security of networking in cyber-physical systems is an important feature in recent computing.
Information that comes to the network needs preevaluation. Our solution presented in this …
Information that comes to the network needs preevaluation. Our solution presented in this …
Detecting cryptomining malware: a deep learning approach for static and dynamic analysis
H Darabian, S Homayounoot, A Dehghantanha… - Journal of Grid …, 2020 - Springer
Cryptomining malware (also referred to as cryptojacking) has changed the cyber threat
landscape. Such malware exploits the victim's CPU or GPU resources with the aim of …
landscape. Such malware exploits the victim's CPU or GPU resources with the aim of …
MTHAEL: Cross-architecture IoT malware detection based on neural network advanced ensemble learning
D Vasan, M Alazab, S Venkatraman… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The complexity, sophistication, and impact of malware evolve with industrial revolution and
technology advancements. This article discusses and proposes a robust cross-architecture …
technology advancements. This article discusses and proposes a robust cross-architecture …
A multi-perspective malware detection approach through behavioral fusion of api call sequence
E Amer, I Zelinka, S El-Sappagh - Computers & Security, 2021 - Elsevier
The widespread development of the malware industry is considered the main threat to our e-
society. Therefore, malware analysis should also be enriched with smart heuristic tools that …
society. Therefore, malware analysis should also be enriched with smart heuristic tools that …
An advanced computing approach for IoT-botnet detection in industrial Internet of Things
In the last few years, attackers have been shifting aggressively to the IoT devices in
industrial Internet of things (IIoT). Particularly, IoT botnet has been emerging as the most …
industrial Internet of things (IIoT). Particularly, IoT botnet has been emerging as the most …
Generative adversarial network to detect unseen Internet of Things malware
Abstract Machine learning is significantly used for malware and adversary detection in the
industrial internet of things networks. However, majority of these methods require a …
industrial internet of things networks. However, majority of these methods require a …