A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges

P Maniriho, AN Mahmood, MJM Chowdhury - Future Generation Computer …, 2022 - Elsevier
There has been an increasing trend of malware release, which raises the alarm for security
professionals worldwide. It is often challenging to stay on top of different types of malware …

A systematic literature review on advanced persistent threat behaviors and its detection strategy

NI Che Mat, N Jamil, Y Yusoff… - Journal of …, 2024 - academic.oup.com
Advanced persistent threats (APTs) pose significant security-related challenges to
organizations owing to their sophisticated and persistent nature, and are inimical to the …

Multi-view deep learning for zero-day Android malware detection

S Millar, N McLaughlin, JM del Rincon… - Journal of Information …, 2021 - Elsevier
Zero-day malware samples pose a considerable danger to users as implicitly there are no
documented defences for previously unseen, newly encountered behaviour. Malware …

V2w-bert: A framework for effective hierarchical multiclass classification of software vulnerabilities

SS Das, E Serra, M Halappanavar… - 2021 IEEE 8th …, 2021 - ieeexplore.ieee.org
We consider the problem of automating the mapping of observed vulnerabilities in software
listed in Common Vulnerabilities and Exposures (CVE) reports to weaknesses listed in …

A local feature engineering strategy to improve network anomaly detection

S Carta, AS Podda, DR Recupero, R Saia - Future Internet, 2020 - mdpi.com
The dramatic increase in devices and services that has characterized modern societies in
recent decades, boosted by the exponential growth of ever faster network connections and …

Cyberterrorism as a global threat: a review on repercussions and countermeasures

S Iftikhar - PeerJ Computer Science, 2024 - peerj.com
An act of cyberterrorism involves using the internet and other forms of information and
communication technology to threaten or cause bodily harm to gain political or ideological …

Federated Learning-Based Solution for DDoS Detection in SDN

J Mateus, GAL Zodi, A Bagula - 2024 International Conference …, 2024 - ieeexplore.ieee.org
One major threat to Software Defined Network (SDN) environments and other computing
systems is Distributed Denial of Service (DDoS) attacks. For the longest time, conventional …

Detection of malicious PE files using synthesized DNA artifacts

SC Ngwobia, A Ralescu, D Kapp, T Kebede - Computers & Security, 2023 - Elsevier
The availability of sophisticated IT tools has provided computer system attackers with the
capacity to develop dangerous metamorphic or polymorphic malware. Such malware …

Service-based federated deep reinforcement learning for anomaly detection in fog ecosystems

M Al-Naday, M Reed, V Dobre, S Toor… - … 26th Conference on …, 2023 - ieeexplore.ieee.org
With Digital transformation, the diversity of services and infrastructure in backhaul fog
network (s) is rising to unprecedented levels. This is causing a rising threat of a wider range …

Meta-Learning for Multi-Family Android Malware Classification

Y Li, D Yuan, T Zhang, H Cai, D Lo, C Gao… - ACM Transactions on …, 2024 - dl.acm.org
With the emergence of smartphones, Android has become a widely used mobile operating
system. However, it is vulnerable when encountering various types of attacks. Every day …