Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures
A Sharma, BB Gupta, AK Singh… - Journal of Ambient …, 2023 - Springer
In today's cyber warfare realm, every stakeholder in cyberspace is becoming more potent by
developing advanced cyber weapons. They have equipped with the most advanced …
developing advanced cyber weapons. They have equipped with the most advanced …
PMANet: Malicious URL detection via post-trained language model guided multi-level feature attention network
The expansion of the Internet has led to the widespread proliferation of malicious URLs,
becoming a primary vector for cyber threats. Detecting malicious URLs is now essential for …
becoming a primary vector for cyber threats. Detecting malicious URLs is now essential for …
Intelligent multimedia content delivery in 5G/6G networks: a reinforcement learning approach
Multimedia content in 5G/6G networks makes safe, confidential, and efficient content
delivery difficult. Intelligent systems that adapt to the ever‐changing network environment …
delivery difficult. Intelligent systems that adapt to the ever‐changing network environment …
Research trends in deep learning and machine learning for cloud computing security
YI Alzoubi, A Mishra, AE Topcu - Artificial Intelligence Review, 2024 - Springer
Deep learning and machine learning show effectiveness in identifying and addressing cloud
security threats. Despite the large number of articles published in this field, there remains a …
security threats. Despite the large number of articles published in this field, there remains a …
NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble
Currently, malware activities pose a substantial risk to the security of Android applications.
These risks are capable of stealing important information and causing chaos in the …
These risks are capable of stealing important information and causing chaos in the …
Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network
Android is the most popular mobile operating system, making it the main target of malware
attacks. Machine learning-based attack detection techniques have recently emerged as …
attacks. Machine learning-based attack detection techniques have recently emerged as …
Past and future land use/land cover, and climate change impacts on environmental sustainability in Vea catchment, Ghana
LULC and climate change are the two most common manifestations of global environmental
change. The objective of this study was to quantify past and future LULC and climate change …
change. The objective of this study was to quantify past and future LULC and climate change …
A brief survey of deep learning methods for android Malware detection
As the number of malware attacks continues to grow year by year with increasing
complexity, Android devices have remained vulnerable with over 30 million mobile attacks …
complexity, Android devices have remained vulnerable with over 30 million mobile attacks …
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights
O Kargarnovin, AM Sadeghzadeh, R Jalili - Journal of Computer Virology …, 2024 - Springer
With the growing use of Deep Learning (DL) to tackle various problems, securing these
models against adversaries has become a primary concern for researchers. Recent studies …
models against adversaries has become a primary concern for researchers. Recent studies …
IMDRPL: Identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol
P Deepavathi, C Mala - Peer-to-Peer Networking and Applications, 2023 - Springer
IoT refers to a collection of smart connected devices that collect and process data to make
the world smarter. By 2025, there will be around 41.6 billion connected IoT devices and …
the world smarter. By 2025, there will be around 41.6 billion connected IoT devices and …