Malware detection issues, challenges, and future directions: A survey

FA Aboaoja, A Zainal, FA Ghaleb, BAS Al-Rimy… - Applied Sciences, 2022 - mdpi.com
The evolution of recent malicious software with the rising use of digital services has
increased the probability of corrupting data, stealing information, or other cybercrimes by …

Implementation of ensemble learning and feature selection for performance improvements in anomaly-based intrusion detection systems

QRS Fitni, K Ramli - … on Industry 4.0, Artificial Intelligence, and …, 2020 - ieeexplore.ieee.org
In recent years, data security in organizational information systems has become a serious
concern. Many attacks are becoming less detectable by firewall and antivirus software. To …

DroidDet: effective and robust detection of android malware using static analysis along with rotation forest model

HJ Zhu, ZH You, ZX Zhu, WL Shi, X Chen, L Cheng - Neurocomputing, 2018 - Elsevier
The Android platform is becoming increasingly popular and various organizations have
developed a variety of applications (App) to cater to market trends. Due to the characteristics …

Hindi fake news detection using transformer ensembles

A Praseed, J Rodrigues, PS Thilagam - Engineering Applications of …, 2023 - Elsevier
In the past few decades, due to the growth of social networking sites such as Whatsapp and
Facebook, information distribution has been at a level never seen before. Knowing the …

Network Intrusion Detection: An IoT and Non IoT-Related Survey

SA Abdulkareem, CH Foh, M Shojafar, F Carrez… - IEEE …, 2024 - ieeexplore.ieee.org
The proliferation of the Internet of Things (IoT) is occurring swiftly and is all-encompassing.
The cyber attack on Dyn in 2016 brought to light the notable susceptibilities of intelligent …

[PDF][PDF] A survey of IoT security threats and defenses

HI Ahmed, AA Nasr, S Abdel-Mageid… - International Journal of …, 2019 - academia.edu
Abstract Internet of Things (IoT) plays a well-known role in the interconnection of the
physical and virtual objects for the purpose of exchanging information. IoT environment can …

Machine learning with blockchain for secure e-voting system

MA Cheema, N Ashraf, A Aftab… - … conference of smart …, 2020 - ieeexplore.ieee.org
Voting is a central component of a country's political life cycle. Privacy, authentication and
integrity of citizens' votes and their data are considered to be essential to any e-voting …

HEMD: a highly efficient random forest-based malware detection framework for Android

HJ Zhu, TH Jiang, B Ma, ZH You, WL Shi… - Neural Computing and …, 2018 - Springer
Mobile phones are rapidly becoming the most widespread and popular form of
communication; thus, they are also the most important attack target of malware. The amount …

Cross-method-based analysis and classification of malicious behavior by api calls extraction

B Ndibanje, KH Kim, YJ Kang, HH Kim, TY Kim… - Applied Sciences, 2019 - mdpi.com
Data-driven public security networking and computer systems are always under threat from
malicious codes known as malware; therefore, a large amount of research and development …

An ensemble learning based IDS using Voting rule: VEL-IDS

S Emanet, GK Baydogmus, O Demir - PeerJ Computer Science, 2023 - peerj.com
Intrusion detection systems (IDSs) analyze internet activities and traffic to detect potential
attacks, thereby safeguarding computer systems. In this study, researchers focused on …