Malware detection issues, challenges, and future directions: A survey

FA Aboaoja, A Zainal, FA Ghaleb, BAS Al-Rimy… - Applied Sciences, 2022 - mdpi.com
The evolution of recent malicious software with the rising use of digital services has
increased the probability of corrupting data, stealing information, or other cybercrimes by …

Trends and challenges in network covert channels countermeasures

L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …

A survey of malware analysis using community detection algorithms

A Amira, A Derhab, EB Karbab, O Nouali - ACM Computing Surveys, 2023 - dl.acm.org
In recent years, we have witnessed an overwhelming and fast proliferation of different types
of malware targeting organizations and individuals, which considerably increased the time …

Utilizing cyber threat hunting techniques to find ransomware attacks: A survey of the state of the art

F Aldauiji, O Batarfi, M Bayousef - IEEE Access, 2022 - ieeexplore.ieee.org
Ransomware is one of the most harmful types of cyber attacks that cause major concerns on
a global scale. It makes the victims' resources unusable by encrypting data or locking …

Adversarial Attacks on Deep Neural Network: Developing Robust Models Against Evasion Technique

GS Nadella, H Gonaygunta, K Meduri… - Transactions on Latest …, 2023 - ijsdcs.com
In the fast-paced field of machine learning, it is important to build agile models that can
correctly classify data in the face of enemy attacks. This paper explores the field of …

A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment

R Kozik, M Pawlicki, M Choraś - Pattern Analysis and Applications, 2021 - Springer
Abstract The Internet of Things (IoT) appliances often expose sensitive data, either directly or
indirectly. They may, for instance, tell whether you are at home right now or what your long …

A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT

M Pawlicki, A Pawlicka, R Kozik, M Choraś - Neurocomputing, 2023 - Elsevier
Cloud computing, edge computing, and Internet-of-Things-these new Internet concepts have
already irreversibly changed and influenced people's lives. The security of the three patterns …

Detection of image steganography using deep learning and ensemble classifiers

M Płachta, M Krzemień, K Szczypiorski, A Janicki - Electronics, 2022 - mdpi.com
In this article, the problem of detecting JPEG images, which have been steganographically
manipulated, is discussed. The performance of employing various shallow and deep …

A survey on cross-architectural IoT malware threat hunting

AD Raju, IY Abualhaol, RS Giagone, Y Zhou… - IEEE …, 2021 - ieeexplore.ieee.org
In recent years, the increase in non-Windows malware threats had turned the focus of the
cybersecurity community. Research works on hunting Windows PE-based malwares are …