[HTML][HTML] Ransomware detection using the dynamic analysis and machine learning: A survey and research directions

U Urooj, BAS Al-rimy, A Zainal, FA Ghaleb… - Applied Sciences, 2021 - mdpi.com
Ransomware is an ill-famed malware that has received recognition because of its lethal and
irrevocable effects on its victims. The irreparable loss caused due to ransomware requires …

Reinforcement learning for iot security: A comprehensive survey

A Uprety, DB Rawat - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The number of connected smart devices has been increasing exponentially for different
Internet-of-Things (IoT) applications. Security has been a long run challenge in the IoT …

A character-level BiGRU-attention for phishing classification

L Yuan, Z Zeng, Y Lu, X Ou, T Feng - Information and Communications …, 2020 - Springer
Online phishing usually tricks victims by showing fake information which is similar to the
legitimate one, so that the phishers could elevate their privileges. In order to guard users …

On detecting and mitigating phishing attacks through featureless machine learning techniques

CH Martins de Souza, MOO Lemos… - Internet Technology …, 2020 - Wiley Online Library
The expansion of the Internet has grown the possibilities for fraudulent actions. Among these
possibilities, we highlight the phishing activity, created with the objective of capturing user's …

PhishKiller: Uma Ferramenta para Detecçao e Mitigaçao de Ataques de Phishing Através de Técnicas de Deep Learning

C Souza, M Lemos, F Silva, R Alves - Anais Estendidos do XIX …, 2019 - sol.sbc.org.br
The expansion of the Internet has grown the possibilities for fraudulent actions. Among these
possibilities, we highlight the phishing activity, created with the objective of capturing the …

[PDF][PDF] A COMPARATIVE STUDY OF INTRUSION DETECTION SYSTEMS USING RNN AND DNN DEEP LEARNING MODELS

L Han, TMZ Murah - ftsm.ukm.my
Intrusion detection is an effective network security defense technology that identifies
intrusions mainly by collecting and analyzing network data. Most traditional intrusion …