[HTML][HTML] The rise of machine learning for detection and classification of malware: Research developments, trends and challenges

D Gibert, C Mateu, J Planes - Journal of Network and Computer …, 2020 - Elsevier
The struggle between security analysts and malware developers is a never-ending battle
with the complexity of malware changing as quickly as innovation grows. Current state-of-the …

Performance comparison and current challenges of using machine learning techniques in cybersecurity

K Shaukat, S Luo, V Varadharajan, IA Hameed, S Chen… - Energies, 2020 - mdpi.com
Cyberspace has become an indispensable factor for all areas of the modern world. The
world is becoming more and more dependent on the internet for everyday living. The …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

[PDF][PDF] Malware detection by eating a whole exe

E Raff, J Barker, J Sylvester, R Brandon… - Workshops at the thirty …, 2018 - cdn.aaai.org
In this work we introduce malware detection from raw byte sequences as a fruitful research
area to the larger machine learning community. Building a neural network for such a …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

Cyber threat detection using machine learning techniques: A performance evaluation perspective

K Shaukat, S Luo, S Chen, D Liu - … international conference on …, 2020 - ieeexplore.ieee.org
The present-day world has become all dependent on cyberspace for every aspect of daily
living. The use of cyberspace is rising with each passing day. The world is spending more …

[PDF][PDF] A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis

R Sihwail, K Omar, KAZ Ariffin - Int. J. Adv. Sci. Eng. Inf. Technol, 2018 - core.ac.uk
The threats malware pose to the people around the world are increasing rapidly. A software
that sneaks to your computer system without your knowledge with a harmful intent to disrupt …

Analyzing and detecting emerging Internet of Things malware: A graph-based approach

H Alasmary, A Khormali, A Anwar, J Park… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The steady growth in the number of deployed Internet of Things (IoT) devices has been
paralleled with an equal growth in the number of malicious software (malware) targeting …

Motif: A malware reference dataset with ground truth family labels

RJ Joyce, D Amlani, C Nicholas, E Raff - Computers & Security, 2023 - Elsevier
Malware family classification is a significant issue with public safety and research
implications that has been hindered by the high cost of expert labels. The vast majority of …

Adversarial learning attacks on graph-based IoT malware detection systems

A Abusnaina, A Khormali, H Alasmary… - 2019 IEEE 39th …, 2019 - ieeexplore.ieee.org
IoT malware detection using control flow graph (CFG)-based features and deep learning
networks are widely explored. The main goal of this study is to investigate the robustness of …