The internet of things security: A survey encompassing unexplored areas and new insights

AE Omolara, A Alabdulatif, OI Abiodun, M Alawida… - Computers & …, 2022 - Elsevier
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …

Machine and deep learning for iot security and privacy: applications, challenges, and future directions

S Bharati, P Podder - Security and communication networks, 2022 - Wiley Online Library
The integration of the Internet of Things (IoT) connects a number of intelligent devices with
minimum human interference that can interact with one another. IoT is rapidly emerging in …

Intelligent malware detection based on graph convolutional network

S Li, Q Zhou, R Zhou, Q Lv - The Journal of Supercomputing, 2022 - Springer
Malware has seriously threatened the safety of computer systems for a long time. Due to the
rapid development of anti-detection technology, traditional detection methods based on …

Machine learning algorithm for malware detection: Taxonomy, current challenges, and future directions

NZ Gorment, A Selamat, LK Cheng, O Krejcar - IEEE Access, 2023 - ieeexplore.ieee.org
Malware has emerged as a cyber security threat that continuously changes to target
computer systems, smart devices, and extensive networks with the development of …

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence

D Kiwia, A Dehghantanha, KKR Choo… - Journal of computational …, 2018 - Elsevier
Malware such as banking Trojans are popular with financially-motivated cybercriminals.
Detection of banking Trojans remains a challenging task, due to the constant evolution of …

Comprehensive analysis of advanced techniques and vital tools for detecting malware intrusion

V Vasani, AK Bairwa, S Joshi, A Pljonkin, M Kaur… - Electronics, 2023 - mdpi.com
In this paper, we explore how incident handling procedures are currently being implemented
to efficiently mitigate malicious software. Additionally, it aims to provide a contextual …

Cyber attack models for smart grid environments

P Eder-Neuhauser, T Zseby, J Fabini… - Sustainable Energy, Grids …, 2017 - Elsevier
Smart grids utilize communication technologies that make them vulnerable to cyber attacks.
Because the power grid is a critical infrastructure, it is a tempting target for sophisticated and …

Developing resilient cyber-physical systems: a review of state-of-the-art malware detection approaches, gaps, and future directions

MI Malik, A Ibrahim, P Hannay, LF Sikos - Computers, 2023 - mdpi.com
Cyber-physical systems (CPSes) are rapidly evolving in critical infrastructure (CI) domains
such as smart grid, healthcare, the military, and telecommunication. These systems are …

[PDF][PDF] Comparative analysis of feature extraction methods of malware detection

S Ranveer, S Hiray - International Journal of Computer Applications, 2015 - Citeseer
Recent years have encountered massive growth in malwares which poses a severe threat to
modern computers and internet security. Existing malware detection systems are confronting …

A Comprehensive Analysis of Explainable AI for Malware Hunting

M Saqib, S Mahdavifar, BCM Fung… - ACM Computing …, 2024 - dl.acm.org
In the past decade, the number of malware variants has increased rapidly. Many
researchers have proposed to detect malware using intelligent techniques, such as Machine …