A survey on artificial intelligence in malware as next-generation threats

CT Thanh, I Zelinka - Mendel, 2019 - ib-b2b.test.infv.eu
Recent developments in Artificial intelligence (AI) have a vast transformative potential for
both cybersecurity defenders and cybercriminals. Anti-malware solutions adopt intelligent …

Security countermeasures of a SCIRAS model for advanced malware propagation

JDH Guillen, AM Del Rey, R Casado-Vara - IEEE Access, 2019 - ieeexplore.ieee.org
In the new and sophisticated cyber attacks (mainly, advanced persistent threats) the
advanced specimens of malware such that zero-day malware play a crucial role. Due to its …

Cyber espionage through Botnets

Z Bederna, T Szadeczky - Security Journal, 2020 - Springer
Botnets, the groups of illegally controlled infected devices on the Internet have had a history
of two decades already. This history shows an evolution of the infection techniques, the …

Software-defined forensic framework for malware disaster management in Internet of Thing devices for extreme surveillance

P Visu, L Lakshmanan, V Murugananthan… - Computer …, 2019 - Elsevier
Malware perception is an important technique which has to be explored to analyze the
corpus amount of malware in short duration for effective disaster management. Accurate …

Local stochastic stability of SIRS models without Lyapunov functions

A Tocino, AM del Rey - … in Nonlinear Science and Numerical Simulation, 2021 - Elsevier
Most of stability analysis for stochastic epidemiological models involve Lyapunov functions.
This work shows how sufficient conditions for the local stochastic asymptotic stability of a …

[PDF][PDF] X-ware: a proof of concept malware utilizing artificial intelligence

TC Truong, J Plucar, BQ Diep, I Zelinka - International Journal of …, 2022 - academia.edu
Recent years have witnessed a dramatic growth in utilizing computational intelligence
techniques for various domains. Coherently, malicious actors are expected to utilize these …

Game-theoretic approach to epidemic modeling of countermeasures against future malware evolution

H Miura, T Kimura, H Aman, K Hirata - Computer Communications, 2023 - Elsevier
Recently, vulnerability mining techniques that discover unknown vulnerabilities based on
machine learning have been attracted much attention for protecting software. Although we …

Propagation of the malware used in APTs based on dynamic Bayesian networks

JD Hernandez Guillen, A Martin del Rey… - Mathematics, 2021 - mdpi.com
Malware is becoming more and more sophisticated these days. Currently, the aim of some
special specimens of malware is not to infect the largest number of devices as possible, but …

Neural swarm virus

TC Truong, I Zelinka, R Senkerik - International Conference on Swarm …, 2019 - Springer
The dramatic improvements in computational intelligence techniques over recent years have
influenced many domains. Hence, it is reasonable to expect that virus writers will taking …

Building epidemic models for living populations and computer networks

S Kondakci, DD Kondakci - Science Progress, 2021 - journals.sagepub.com
Accurate modeling of viral outbreaks in living populations and computer networks is a
prominent research field. Many researchers are in search for simple and realistic models to …