Utilizing machine learning and deep learning in cybesecurity: an innovative approach

K Dushyant, G Muskan, Annu, A Gupta… - Cyber security and …, 2022 - Wiley Online Library
Machine learning (ML) and deep learning (DL) have both produced overwhelming interest
and drawn unparalleled community interest recently. With a growing convergence of online …

Deep security analysis of program code: A systematic literature review

T Sonnekalb, TS Heinze, P Mäder - Empirical Software Engineering, 2022 - Springer
Due to the continuous digitalization of our society, distributed and web-based applications
become omnipresent and making them more secure gains paramount relevance. Deep …

Artificial intelligence algorithms for cyberspace security applications: a technological and status review

J Chen, D Wu, R Xie - Frontiers of Information Technology & Electronic …, 2023 - Springer
Three technical problems should be solved urgently in cyberspace security: the timeliness
and accuracy of network attack detection, the credibility assessment and prediction of the …

Application of machine learning and deep learning in cybersecurity: An innovative approach

D Kaushik, M Garg, A Gupta… - … Approach to Modern …, 2022 - taylorfrancis.com
Machine learning (ML) and deep learning (DL) both drawn unparalleled community interest
recently. With a growing convergence of online activities and digital life, the way people …

Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks

L Deng, H Wen, M Xin, H Li, Z Pan, L Sun - Computers & Security, 2023 - Elsevier
IoT malware analysis is crucial for understanding the behavior and purpose of malware
samples. While deep learning methods have been applied to IoT malware analysis using …

Network intrusion detection using feature fusion with deep learning

A Ayantayo, A Kaur, A Kour, X Schmoor, F Shah… - Journal of Big Data, 2023 - Springer
Network intrusion detection systems (NIDSs) are one of the main tools used to defend
against cyber-attacks. Deep learning has shown remarkable success in network intrusion …

A transformer-based function symbol name inference model from an assembly language for binary reversing

H Kim, J Bak, K Cho, H Koo - Proceedings of the 2023 ACM Asia …, 2023 - dl.acm.org
Reverse engineering of a stripped binary has a wide range of applications, yet it is
challenging mainly due to the lack of contextually useful information within. Once debugging …

Semantic-aware binary code representation with bert

H Koo, S Park, D Choi, T Kim - arXiv preprint arXiv:2106.05478, 2021 - arxiv.org
A wide range of binary analysis applications, such as bug discovery, malware analysis and
code clone detection, require recovery of contextual meanings on a binary code. Recently …

Artificial intelligence-based cyber security applications

SR Potula, R Selvanambi, M Karuppiah… - Artificial Intelligence and …, 2023 - Springer
Artificial Intelligence occupies a major part in the end-to-end technology we use every day.
In order to ensure and enhance security, Artificial Intelligence techniques are used in cyber …

Cross-site scripting guardian: A static XSS detector based on data stream input-output association mining

C Li, Y Wang, C Miao, C Huang - Applied Sciences, 2020 - mdpi.com
The largest number of cybersecurity attacks is on web applications, in which Cross-Site
Scripting (XSS) is the most popular way. The code audit is the main method to avoid the …