Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures

A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023 - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by
developing advanced cyber weapons. They have equipped with the most advanced …

PMANet: Malicious URL detection via post-trained language model guided multi-level feature attention network

R Liu, Y Wang, H Xu, Z Qin, F Zhang, Y Liu, Z Cao - Information Fusion, 2025 - Elsevier
The expansion of the Internet has led to the widespread proliferation of malicious URLs,
becoming a primary vector for cyber threats. Detecting malicious URLs is now essential for …

Intelligent multimedia content delivery in 5G/6G networks: a reinforcement learning approach

MJ Iqbal, M Farhan, F Ullah… - Transactions on …, 2024 - Wiley Online Library
Multimedia content in 5G/6G networks makes safe, confidential, and efficient content
delivery difficult. Intelligent systems that adapt to the ever‐changing network environment …

Research trends in deep learning and machine learning for cloud computing security

YI Alzoubi, A Mishra, AE Topcu - Artificial Intelligence Review, 2024 - Springer
Deep learning and machine learning show effectiveness in identifying and addressing cloud
security threats. Despite the large number of articles published in this field, there remains a …

NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble

F Ullah, S Ullah, G Srivastava, JCW Lin, Y Zhao - Wireless Networks, 2024 - Springer
Currently, malware activities pose a substantial risk to the security of Android applications.
These risks are capable of stealing important information and causing chaos in the …

Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network

F Ullah, S Ullah, G Srivastava, JCW Lin - Physical Communication, 2023 - Elsevier
Android is the most popular mobile operating system, making it the main target of malware
attacks. Machine learning-based attack detection techniques have recently emerged as …

Past and future land use/land cover, and climate change impacts on environmental sustainability in Vea catchment, Ghana

GF Arfasa, E Owusu-Sekyere, DA Doke - Geocarto International, 2023 - Taylor & Francis
LULC and climate change are the two most common manifestations of global environmental
change. The objective of this study was to quantify past and future LULC and climate change …

A brief survey of deep learning methods for android Malware detection

A Joomye, MH Ling, KLA Yau - International Journal of System Assurance …, 2024 - Springer
As the number of malware attacks continues to grow year by year with increasing
complexity, Android devices have remained vulnerable with over 30 million mobile attacks …

Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights

O Kargarnovin, AM Sadeghzadeh, R Jalili - Journal of Computer Virology …, 2024 - Springer
With the growing use of Deep Learning (DL) to tackle various problems, securing these
models against adversaries has become a primary concern for researchers. Recent studies …

IMDRPL: Identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol

P Deepavathi, C Mala - Peer-to-Peer Networking and Applications, 2023 - Springer
IoT refers to a collection of smart connected devices that collect and process data to make
the world smarter. By 2025, there will be around 41.6 billion connected IoT devices and …