A comprehensive study of DDoS attacks over IoT network and their countermeasures

P Kumari, AK Jain - Computers & Security, 2023 - Elsevier
IoT offers capabilities to gather information from digital devices, infer from their results, and
maintain and optimize these devices in different domains. IoT is heterogeneous in nature …

A survey on machine learning-based malware detection in executable files

J Singh, J Singh - Journal of Systems Architecture, 2021 - Elsevier
In last decade, a proliferation growth in the development of computer malware has been
done. Nowadays, cybercriminals (attacker) use malware as a weapon to carry out the …

Survey of machine learning techniques for malware analysis

D Ucci, L Aniello, R Baldoni - Computers & Security, 2019 - Elsevier
Coping with malware is getting more and more challenging, given their relentless growth in
complexity and volume. One of the most common approaches in literature is using machine …

A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …

Deep learning for classification of malware system call sequences

B Kolosnjaji, A Zarras, G Webster, C Eckert - AI 2016: Advances in …, 2016 - Springer
The increase in number and variety of malware samples amplifies the need for improvement
in automatic detection and classification of the malware variants. Machine learning is a …

AVclass: A Tool for Massive Malware Labeling

M Sebastián, R Rivera, P Kotzias… - Research in Attacks …, 2016 - Springer
Labeling a malicious executable as a variant of a known family is important for security
applications such as triage, lineage, and for building reference datasets in turn used for …

A {Large-scale} analysis of the security of embedded firmwares

A Costin, J Zaddach, A Francillon… - 23rd USENIX security …, 2014 - usenix.org
As embedded systems are more than ever present in our society, their security is becoming
an increasingly important issue. However, based on the results of many recent analyses of …

[HTML][HTML] Malware analysis and classification: A survey

E Gandotra, D Bansal, S Sofat - Journal of Information Security, 2014 - scirp.org
One of the major and serious threats on the Internet today is malicious software, often
referred to as a malware. The malwares being designed by attackers are polymorphic and …

Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art

X Ling, L Wu, J Zhang, Z Qu, W Deng, X Chen… - Computers & …, 2023 - Elsevier
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …

Machine-learning methods for computational science and engineering

M Frank, D Drikakis, V Charissis - Computation, 2020 - mdpi.com
The re-kindled fascination in machine learning (ML), observed over the last few decades,
has also percolated into natural sciences and engineering. ML algorithms are now used in …