Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls

PMS Sánchez, AH Celdrán, G Bovet… - arXiv preprint arXiv …, 2024 - arxiv.org
In the current cybersecurity landscape, protecting military devices such as communication
and battlefield management systems against sophisticated cyber attacks is crucial. Malware …

Accurate Path Prediction of Provenance Traces

R Ahmad, HY Jung, Y Nakamura, T Malik - Proceedings of the 33rd ACM …, 2024 - dl.acm.org
Several security and workflow applications require provenance information at the operating
system level for diagnostics. The resulting provenance traces are often more informative if …

Speed and Performance of Parserless and Unsupervised Anomaly Detection Methods on Software Logs

J Nyyssölä, M Mäntylä - 2024 IEEE 24th International …, 2024 - ieeexplore.ieee.org
Software log analysis can be laborious and time consuming. Time and labeled data are
usually lacking in industrial settings. This paper studies unsupervised and time efficient …

Toward Adaptive Tracing: Efficient System Behavior Analysis using Language Models

K Darvishi, M Noferesti, N Ezzati-Jivan - … of the 2024 ACM/IEEE 44th …, 2024 - dl.acm.org
Tracing, a technique essential for unraveling the complexities of computer systems'
behavior, involves the organized collection of low-level events, enabling anomaly …

Artificial Intelligence in Cybersecurity: Finding Malware

D Namiot, E Ilyushin - International Journal of Open Information …, 2024 - injoit.ru
In this article, we examine in detail the technical aspects of searching (classifying) malicious
software using machine (deep) learning. We consider both a classic example of …

[HTML][HTML] Искусственный интеллект в кибербезопасности: поиск вредоносного программного обеспечения

ДЕ Намиот, ЕА Ильюшин - International Journal of Open …, 2024 - cyberleninka.ru
В настоящей статье мы подробно рассматриваем технические аспекты поиска
(классификации) вредоносного программного обеспечения с помощью машинного …