Deep learning-powered malware detection in cyberspace: a contemporary review

A Redhu, P Choudhary, K Srinivasan, TK Das - Frontiers in Physics, 2024 - frontiersin.org
This article explores deep learning models in the field of malware detection in cyberspace,
aiming to provide insights into their relevance and contributions. The primary objective of the …

DPUAUT: Secure Authentication Protocol with SmartNiC Integration for Trustworthy Communications in Intelligent Swarm Systems

RA Bakar, F Paolucci, F Cugini, P Castoldi… - IEEE …, 2024 - ieeexplore.ieee.org
Swarm devices are becoming increasingly prevalent in next-generation networks because
they can efficiently handle large-scale distributed computing tasks. The traditional cloud …

A novel model for malware propagation on wireless sensor networks.

ÁM Martín del Rey - Mathematical Biosciences and Engineering, 2024 - gredos.usal.es
[EN] The main goal of this work was to propose a novel mathematical model for malware
propagation on wireless sensor networks (WSN). Specifically, the proposed model was a …

SRAM PUFs: A Study of Aging Impact and Potential Mitigation

NP Bhatta, S Al Majmaie, F Amsaad… - 2024 IEEE 1st …, 2024 - ieeexplore.ieee.org
This paper presents a study of the aging Impact on SRAM PUF and the potential mitigation.
Moreover, the natural variabilities in SRAM cells are harnessed by SRAM PUFs to create …

A Novel Approach of Evasive Malware Analysis Through Binary Opcode and BERT

S Wang, B Xu - 2024 - researchsquare.com
This study addressed the growing challenge of evasive malware detection by introducing an
innovative approach that integrates binary opcode analysis with the advanced machine …