Assessing and augmenting SCADA cyber security: A survey of techniques

S Nazir, S Patel, D Patel - Computers & Security, 2017 - Elsevier
SCADA systems monitor and control critical infrastructures of national importance such as
power generation and distribution, water supply, transportation networks, and manufacturing …

A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges

P Maniriho, AN Mahmood, MJM Chowdhury - Future Generation Computer …, 2022 - Elsevier
There has been an increasing trend of malware release, which raises the alarm for security
professionals worldwide. It is often challenging to stay on top of different types of malware …

A deep recurrent neural network based approach for internet of things malware threat hunting

H HaddadPajouh, A Dehghantanha, R Khayami… - Future Generation …, 2018 - Elsevier
Abstract Internet of Things (IoT) devices are increasingly deployed in different industries and
for different purposes (eg sensing/collecting of environmental data in both civilian and …

SEDMDroid: An enhanced stacking ensemble framework for Android malware detection

H Zhu, Y Li, R Li, J Li, Z You… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The popularity of the Android platform in smartphones and other Internet-of-Things devices
has resulted in the explosive of malware attacks against it. Malware presents a serious …

Explaining intrusion detection-based convolutional neural networks using shapley additive explanations (shap)

R Younisse, A Ahmad, Q Abu Al-Haija - Big Data and Cognitive …, 2022 - mdpi.com
Artificial intelligence (AI) and machine learning (ML) models have become essential tools
used in many critical systems to make significant decisions; the decisions taken by these …

Does every second count? time-based evolution of malware behavior in sandboxes

A Küchler, A Mantovani, Y Han, L Bilge… - NDSS 2021, Network …, 2021 - hal.science
The amount of time in which a sample is executed is one of the key parameters of a malware
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …

Android based malware detection using a multifeature collaborative decision fusion approach

S Sheen, R Anitha, V Natarajan - Neurocomputing, 2015 - Elsevier
Smart mobile device usage has expanded at a very high rate all over the world. Since the
mobile devices nowadays are used for a wide variety of application areas like personal …

Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data

S Huda, S Miah, MM Hassan, R Islam, J Yearwood… - Information …, 2017 - Elsevier
Cyber-physical systems (CPS) are used increasingly in modern industrial systems. These
systems currently encounter a significant threat of malicious activities created by malicious …

Detecting cryptomining using dynamic analysis

D Carlin, P O'kane, S Sezer… - 2018 16th annual …, 2018 - ieeexplore.ieee.org
With the rise in worth and popularity of cryptocurrencies, a new opportunity for criminal gain
is being exploited and with little currently offered in the way of defence. The cost of mining …

Multiple instance learning for malware classification

J Stiborek, T Pevný, M Rehák - Expert Systems with Applications, 2018 - Elsevier
This work addresses classification of unknown binaries executed in sandbox by modeling
their interaction with system resources (files, mutexes, registry keys and communication with …