[HTML][HTML] The rise of machine learning for detection and classification of malware: Research developments, trends and challenges
The struggle between security analysts and malware developers is a never-ending battle
with the complexity of malware changing as quickly as innovation grows. Current state-of-the …
with the complexity of malware changing as quickly as innovation grows. Current state-of-the …
Malware detection issues, challenges, and future directions: A survey
The evolution of recent malicious software with the rising use of digital services has
increased the probability of corrupting data, stealing information, or other cybercrimes by …
increased the probability of corrupting data, stealing information, or other cybercrimes by …
A survey on machine learning techniques for cyber security in the last decade
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
A state-of-the-art survey of malware detection approaches using data mining techniques
A Souri, R Hosseini - Human-centric Computing and Information Sciences, 2018 - Springer
Data mining techniques have been concentrated for malware detection in the recent
decade. The battle between security analyzers and malware scholars is everlasting as …
decade. The battle between security analyzers and malware scholars is everlasting as …
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
Ransomware is a malware category that exploits security mechanisms such as cryptography
in order to hijack user files and related resources and demands money in exchange for the …
in order to hijack user files and related resources and demands money in exchange for the …
Performance comparison and current challenges of using machine learning techniques in cybersecurity
Cyberspace has become an indispensable factor for all areas of the modern world. The
world is becoming more and more dependent on the internet for everyday living. The …
world is becoming more and more dependent on the internet for everyday living. The …
Droidcat: Effective android malware detection and categorization via app-level profiling
Most existing Android malware detection and categorization techniques are static
approaches, which suffer from evasion attacks, such as obfuscation. By analyzing program …
approaches, which suffer from evasion attacks, such as obfuscation. By analyzing program …
Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures
A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023 - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by
developing advanced cyber weapons. They have equipped with the most advanced …
developing advanced cyber weapons. They have equipped with the most advanced …
Cyberattacks detection in iot-based smart city applications using machine learning techniques
In recent years, the widespread deployment of the Internet of Things (IoT) applications has
contributed to the development of smart cities. A smart city utilizes IoT-enabled technologies …
contributed to the development of smart cities. A smart city utilizes IoT-enabled technologies …
Dynamic analysis for IoT malware detection with convolution neural network model
Internet of Things (IoT) technology provides the basic infrastructure for a hyper connected
society where all things are connected and exchange information through the Internet. IoT …
society where all things are connected and exchange information through the Internet. IoT …