Ransomware reloaded: Re-examining its trend, research and mitigation in the era of data exfiltration

T McIntosh, T Susnjak, T Liu, D Xu, P Watters… - ACM Computing …, 2024 - dl.acm.org
Ransomware has grown to be a dominant cybersecurity threat, by exfiltrating, encrypting or
destroying valuable user data, and causing numerous disruptions to victims. The severity of …

IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset

Y Yin, J Jang-Jaccard, W Xu, A Singh, J Zhu… - Journal of Big Data, 2023 - Springer
The effectiveness of machine learning models can be significantly averse to redundant and
irrelevant features present in the large dataset which can cause drastic performance …

Crypto-ransomware: A revision of the state of the art, advances and challenges

JA Gómez Hernández, P García Teodoro… - Electronics, 2023 - mdpi.com
According to the premise that the first step to try to solve a problem is to deepen our
knowledge of it as much as possible, this work is mainly aimed at diving into and …

Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier

U Zahoora, A Khan, M Rajarajan, SH Khan, M Asam… - Scientific reports, 2022 - nature.com
Ransomware attacks pose a serious threat to Internet resources due to their far-reaching
effects. It's Zero-day variants are even more hazardous, as less is known about them. In this …

Artificial intelligence-enabled DDoS detection for blockchain-based smart transport systems

T Liu, F Sabrina, J Jang-Jaccard, W Xu, Y Wei - Sensors, 2021 - mdpi.com
A smart public transport system is expected to be an integral part of our human lives to
improve our mobility and reduce the effect of our carbon footprint. The safety and ongoing …

From data and model levels: Improve the performance of few-shot malware classification

Y Chai, J Qiu, L Yin, L Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Existing malware classification methods cannot handle the open-ended growth of new or
unknown malware well because it only focuses on pre-defined malware classes with …

Self-supervised metalearning generative adversarial network for few-shot fault diagnosis of hoisting system with limited data

Y Li, F Xu, CG Lee - IEEE Transactions on Industrial Informatics, 2022 - ieeexplore.ieee.org
Few-shot data collected from hoisting system suffer from inadequate information in the
practical industries, which reduces the diagnostic accuracy of the data-driven-based fault …

[HTML][HTML] Ransomware early detection: A survey

M Cen, F Jiang, X Qin, Q Jiang, R Doss - Computer Networks, 2024 - Elsevier
In recent years, ransomware attacks have exploded globally, and it has become one of the
most significant cyber threats to digital infrastructure. Such attacks have been targeting …

Feature fusion-based malicious code detection with dual attention mechanism and BiLSTM

G Shen, Z Chen, H Wang, H Chen, S Wang - Computers & Security, 2022 - Elsevier
Malicious code has become an important factor threatening network security. Single feature-
based malicious code detection methods have achieved good detection results, but when …

[HTML][HTML] A systematic literature review on Windows malware detection: Techniques, research issues, and future directions

P Maniriho, AN Mahmood, MJM Chowdhury - Journal of Systems and …, 2023 - Elsevier
The aim of this systematic literature review (SLR) is to provide a comprehensive overview of
the current state of Windows malware detection techniques, research issues, and future …