Intelligent dynamic malware detection using machine learning in IP reputation for forensics data analytics

N Usman, S Usman, F Khan, MA Jan, A Sajid… - Future Generation …, 2021 - Elsevier
In the near future, objects have to connect with each other which can result in gathering
private sensitive data and cause various security threats and cyber crimes. To prevent cyber …

Does every second count? time-based evolution of malware behavior in sandboxes

A Küchler, A Mantovani, Y Han, L Bilge… - NDSS 2021, Network …, 2021 - hal.science
The amount of time in which a sample is executed is one of the key parameters of a malware
analysis sandbox. Setting the threshold too high hinders the scalability and reduces the …

Humans vs. machines in malware classification

S Aonzo, Y Han, A Mantovani, D Balzarotti - 32nd USENIX Security …, 2023 - usenix.org
Humans vs. Machines in Malware Classification Page 1 This paper is included in the
Proceedings of the 32nd USENIX Security Symposium. August 9–11, 2023 • Anaheim, CA, USA …

A Machine Learning Approach to Malware Detection Using Application Programming Interface Calls (MDAPI).

AK Yuksel, Y Ar - Traitement du Signal, 2023 - search.ebscohost.com
Today, all kinds of institutions and organizations depend on the Internet and information
systems. They have been an inseparable part of human life. This brings out not only …

Survey and Analysis on ATT&CK Mapping Function of Online Sandbox for Understanding and Efficient Using

S Fujii, R Yamagishi, T Yamauchi - Journal of Information Processing, 2022 - jstage.jst.go.jp
Dynamic analysis that automatically analyzes malware has become the defacto standard for
coping with the huge amount of current malware types. One analysis support is a function …

Realising honeypot-as-a-service for smart home solutions

A Kostopoulos, IP Chochliouros… - 2020 5th South-East …, 2020 - ieeexplore.ieee.org
The YAKSHA project aims at reinforcing EUASEAN cooperation and building partnerships in
cybersecurity domain by developing a solution tailored to specific national needs leveraging …

Protocol deployment for employing honeypot-as-a-service

A Kostopoulos, IP Chochliouros, C Patsakis… - … and Innovations. AIAI …, 2020 - Springer
The YAKSHA project aims at reinforcing EU-ASEAN cooperation and building partnerships
in cybersecurity domain by developing a solution tailored to specific national needs …