Recurrent neural network for detecting malware

S Jha, D Prashar, HV Long, D Taniar - computers & security, 2020 - Elsevier
In this paper, we propose an efficient Recurrent Neural Network (RNN) to detect malware.
RNN is a classification of artificial neural networks connected between nodes to form a …

[HTML][HTML] An enhanced static taint analysis approach to detect input validation vulnerability

AW Marashdih, ZF Zaaba, K Suwais - Journal of King Saud University …, 2023 - Elsevier
The detection of feasible paths helps to minimize the false positive rate. However, the
previous works did not consider the feasibility of the program paths during the analysis …

A proactive method of the webshell detection and prevention based on deep traffic analysis

HV Le, HP Du, HN Nguyen… - … Journal of Web and …, 2022 - inderscienceonline.com
The popularity of today's web application has led to web servers frequently the objects of
webshell attacks. In this paper, we propose a new deep inspection method that is composed …

Intrusion detection algorithm based on image enhanced convolutional neural network

Q Wang, W Zhao, J Ren - Journal of Intelligent & Fuzzy …, 2021 - content.iospress.com
Abstract Intrusion Detection System (IDS) can reduce the losses caused by intrusion
behaviors and protect users' information security. The effectiveness of IDS depends on the …

Detection of web attacks using machine learning based URL classification techniques

A Saxena, A Arora, S Saxena… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
For a long time, online attacks were regarded to pose a severe threat to web-based
applications, websites, and clients. It can bypass authentication methods, steal sensitive …

New expected impact functions and algorithms for modeling games under soft sets

I Deli, HV Long, LH Son, R Kumar… - Journal of Intelligent & …, 2020 - content.iospress.com
Soft set is the power tool to deal with uncertainty in a parametric manner. In applications of
soft set, one of the most important steps is to define mappings on soft sets. In this study, we …

Image Retrieval Using Intensity Gradients and Texture Chromatic Pattern: Satellite Images Retrieval

IJ Jacob, B Paulraj, PE Darney, HV Long… - International Journal of …, 2021 - igi-global.com
Methods to retrieve images involve retrieving images from the database by using features of
it. They are colour, shape, and texture. These features are used to find the similarity for the …

Exploring the Landscape of Website Vulnerability Scanners: A Comprehensive Review and Comparative Analysis

HM Zangana - Redefining Security With Cyber AI, 2024 - igi-global.com
This chapter provides a comprehensive analysis of web application vulnerability scanners,
examining their characteristics, effectiveness, and implications for web security. Through a …

Cybersecurity Maturity Model to Prevent Cyberattacks on Web Applications Based on ISO 27032 and NIST

E Arenas, J Palomino… - 2023 IEEE XXX …, 2023 - ieeexplore.ieee.org
During the last years, the number of cyberattacks, especially on web applications, has been
increasing. Cyber agents target both large and small companies, which is why it is …

Security Vulnerability Scanning Scheme of Web Application Based on Django

Z Xiong, J Ye - … on Cognitive based Information Processing and …, 2023 - Springer
With the continuous development of internet technology, web applications are becoming
more and more popular, and the resulting open-source code vulnerability intrusion problems …