The Method and Software Tool for Identification of the Machine Code Architecture in Cyberphysical Devices

I Kotenko, K Izrailov, M Buinevich - Journal of Sensor and Actuator …, 2023 - mdpi.com
This work solves the problem of identification of the machine code architecture in
cyberphysical devices. A basic systematization of the Executable and Linkable Format and …

An Autoencoder-based Multi-task Learning for Intrusion Detection in IoT Networks

H Dong, I Kotenko - 2023 IEEE Ural-Siberian Conference on …, 2023 - ieeexplore.ieee.org
The size of Internet of Things (IoT) networks, the physical devices connected to them, and
the volume of data processed have grown exponentially over the past decade. Meanwhile …

Intensive Malware Detection Approach based on Data Mining

IE Salem, KH Al-Saedi - Journal of Applied Engineering and …, 2023 - journal.yrpipku.com
Malicious software, sometimes known as malware, is software designed to harm a computer,
network, or any of the connected resources. Without the user's knowledge, malware can …

Train Without Label: A Self-supervised One-Class Classification Approach for IoT Anomaly Detection

H Dong, I Kotenko - … Conference on Intelligent Information Technologies for …, 2023 - Springer
The intrusion detection techniques remain essential for network security, especially for the
Internet of Things (IoT) environment, where there are crucial network systems and …

Malware Analysis With Machine Learning: Methods, Challenges, and Future Directions

R Singh, P Kumar - Malware Analysis and Intrusion Detection in …, 2023 - igi-global.com
Malware attacks are growing years after years because of increasing android, IOT along
with traditional computing devices. To protect all these devices malware analysis is …