A comprehensive survey on deep learning based malware detection techniques

M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …

Artificial intelligence (AI) and machine learning (ML)-based Information security in electric vehicles: A review

N Mohamed, SK Almazrouei, A Oubelaid… - 2023 5th Global …, 2023 - ieeexplore.ieee.org
The use of artificial intelligence (AI) and machine learning (ML) in electric vehicles (EVs) is
gaining popularity as a means of improving information security. However, there is a lack of …

Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework

T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …

A threat hunting framework for industrial control systems

Z Jadidi, Y Lu - IEEE Access, 2021 - ieeexplore.ieee.org
An Industrial Control System (ICS) adversary often takes different actions to exploit
vulnerabilities, pass the border between Information Technology (IT) and Operational …

Air‐Gapped Networks: Exfiltration without Privilege Escalation for Military and Police Units

N Mohamed, SK Almazrouei, A Oubelaid… - Wireless …, 2022 - Wiley Online Library
Several security tools have been described in recent times to assist security teams; however,
the effectiveness and success remain limited to specific devices. Phishing is a type of …

A systematic literature review on advanced persistent threat behaviors and its detection strategy

NI Che Mat, N Jamil, Y Yusoff… - Journal of …, 2024 - academic.oup.com
Advanced persistent threats (APTs) pose significant security-related challenges to
organizations owing to their sophisticated and persistent nature, and are inimical to the …

[HTML][HTML] Performance evaluation of a fast and efficient intrusion detection framework for advanced persistent threat-based cyberattacks

NE Park, YR Lee, S Joo, SY Kim, SH Kim… - Computers and …, 2023 - Elsevier
After the COVID-19 pandemic, cyberattacks are increasing as non-face-to-face
environments such as telecommuting and telemedicine proliferate. Cyberattackers exploit …

A threat modeling framework for IoT-Based botnet attacks

H Jin, GH Jeon, HWA Choi, S Jeon, JT Seo - Heliyon, 2024 - cell.com
Abstract Internet of Things (IoT) devices are much closer to users than personal computers
used in traditional computing environments. Due to prevalence of IoT devices, even if they …

Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and Trends

R Buchta, G Gkoktsis, F Heine, C Kleiner - Digital Threats: Research and …, 2024 - dl.acm.org
Advanced persistent threat (APT) attacks present a significant challenge for any
organization, as they are difficult to detect due to their elusive nature and characteristics. In …

A machine learning-enhanced endpoint detection and response framework for fast and proactive defense against advanced cyber attacks

SJ Lee, SE Jeon, IG Lee - Soft Computing, 2024 - Springer
The risk of intelligent cyber-attacks is increasing as the number of endpoint devices surges
and non-face-to-face services expand. As the damage caused by advanced persistent threat …