Static analysis of information systems for IoT cyber security: a survey of machine learning approaches

I Kotenko, K Izrailov, M Buinevich - Sensors, 2022 - mdpi.com
Ensuring security for modern IoT systems requires the use of complex methods to analyze
their software. One of the most in-demand methods that has repeatedly been proven to be …

A survey on machine learning techniques for source code analysis

T Sharma, M Kechagia, S Georgiou, R Tiwari… - arXiv preprint arXiv …, 2021 - arxiv.org
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …

False alert detection based on deep learning and machine learning

S Li, D Qin, X Wu, J Li, B Li, W Han - International Journal on …, 2022 - igi-global.com
Among the large number of network attack alerts generated every day, actual security
incidents are usually overwhelmed by a large number of redundant alerts. Therefore, how to …

Attribution classification method of APT malware in IoT using machine learning techniques

S Li, Q Zhang, X Wu, W Han… - Security and …, 2021 - Wiley Online Library
In recent years, the popularity of IoT (Internet of Things) applications and services has
brought great convenience to people′ s lives, but ubiquitous IoT has also brought many …

A weighted network community detection algorithm based on deep learning

S Li, L Jiang, X Wu, W Han, D Zhao, Z Wang - Applied Mathematics and …, 2021 - Elsevier
At present, community detection methods are mostly focused on the investigation at
unweighted networks. However, real-world networks are always complex, and unweighted …

Malicious mining code detection based on ensemble learning in cloud computing environment

S Li, Y Li, W Han, X Du, M Guizani, Z Tian - Simulation Modelling Practice …, 2021 - Elsevier
Hackers increasingly tend to abuse and nefariously use cloud services by injecting
malicious mining code. This malicious code can be spread through infrastructures in the …

A survey of advanced persistent threats attack and defense

Y Mei, W Han, S Li, X Wu - 2021 IEEE Sixth International …, 2021 - ieeexplore.ieee.org
Advanced Persistent Threats (APT) are a complex attack method aimed at specific targets to
steal high-value sensitive information or damage the target organization's infrastructure. The …

Imbalanced malware family classification using multimodal fusion and weight self-learning

S Li, Y Li, X Wu, S Al Otaibi… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In recent years, the increasing prevalence of Intelligent Transportation Systems with
advanced technologies has led to the emergence of many targeted forms of malware such …

[HTML][HTML] A survey on machine learning techniques applied to source code

T Sharma, M Kechagia, S Georgiou, R Tiwari… - Journal of Systems and …, 2024 - Elsevier
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …

Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection

HIW Al-Shahwani, MM Mijwil, R Doshi… - … in Blockchain Systems, 2024 - igi-global.com
Blockchain represents a new promising technology with a huge economic impact resulting
from its uses in various fields such as digital currency and banking; malware represents a …