[PDF][PDF] Overview of cyberattack on saudi organizations

S Alelyani, HK GR - Journal of Information Security and …, 2018 - journals.nauss.edu.sa
The beginning of Twenty first century saw a new dimension of security, the cybersecurity.
Developed countries have started exploiting the vulnerabilities of cybersecurity to gain …

Real-Time APT Detection Technologies: A Literature Review

S Mönch, H Roth - … on Cyber Security and Resilience (CSR), 2023 - ieeexplore.ieee.org
Recently, the usage of advanced persistent threats (APT) increased rapidly in the context of
cyberwar. To perform countermeasures against such attacks, an efficient APT detection is …

Developing a Κ-ary malware using blockchain

J Moubarak, M Chamoun, E Filiol - NOMS 2018-2018 IEEE/IFIP …, 2018 - ieeexplore.ieee.org
Cyberattacks are nowadays moving rapidly. They are customized, multi-vector, staged in
multiple flows and targeted. Moreover, new hacking playgrounds appeared to reach mobile …

[PDF][PDF] Comparing Machine Learning Techniques for Malware Detection.

J Moubarak, T Feghali - ICISSP, 2020 - scitepress.org
Cyberattacks and the use of malware are more and more omnipresent nowadays. Targets
are as varied as states or publicly traded companies. Malware analysis has become a very …

Investigating the darknet

RB Zeid, J Moubarak, C Bassil - 2020 International Wireless …, 2020 - ieeexplore.ieee.org
Cybercrime is growing dramatically in the technological world nowadays. World Wide Web
criminals exploit the personal information of internet users and use them to their advantage …

One IOTA of Countless Legions: A Next Generation botnet Premises Design Substrated on Blockchain and Internet of Things

H Gao, L Li, H Lei, N Tian, H Lin… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Although botnet had been at the top of the list of main threats to the cyber world for an
extended period of time, its harmfulness has been constrained nowadays due to the …

Beyond labeling: Using clustering to build network behavioral profiles of malware families

A Nadeem, C Hammerschmidt, CH Gañán… - Malware analysis using …, 2021 - Springer
Malware family labels are known to be inconsistent. They are also black-box since they do
not represent the capabilities of malware. The current state of the art in malware capability …

On the dissemination of cyber threat intelligence through hyperledger

J Moubarak, C Bassil, J Antoun - 2021 17th International …, 2021 - ieeexplore.ieee.org
Blockchain is widely used nowadays and it is expected to be more exploited in the near
future. Blockchain tends to be more used due to its security layer beyond any active …

Cluster analysis of malware family relationships

S Basole, M Stamp - Malware Analysis Using Artificial Intelligence and …, 2021 - Springer
In this chapter, we use K-means clustering to analyze various relationships between
malware samples. We consider a dataset comprising 20 malware families with 1000 …

Runtime api signature for fileless malware detection

R Tarek, S Chaimae, C Habiba - … : Proceedings of the 2020 Future of …, 2020 - Springer
Nowadays, cybercriminals become sophisticated and conducting advanced malware attacks
on critical infrastructures, both, in the private and public sector. Therefore, it's important to …