The application of cyclostationary malware detection using boruta and pca

M Nkongolo, JP van Deventer, SM Kasongo - Computer Networks and …, 2022 - Springer
An analysis of cyclostationary malware is introduced. The most important cyclostationary
features used for network intrusion detection systems (NIDS) are then detected with a …

Mitigating Insider Threat: A Neural Network Approach for Enhanced Security

P Lavanya, HA Glory, VSS Sriram - IEEE Access, 2024 - ieeexplore.ieee.org
Detecting insider threats is the foremost challenge in many institutions because of the
abnormal behavior of legitimate access and network crawling in the Internet of Things (IoT) …

Data instrumentation from IoT network traffic as support for security management

A Vergütz, BV Dos Santos, B Kantarci… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Internet of Things revolutionizes human life by inaugurating scenarios such as smart
homes. However, IoT devices contain much sensitive information about users and devices …

Assessing Cyclostationary Malware Detection via Feature Selection and Classification

M Nkongolo - arXiv preprint arXiv:2308.15237, 2023 - arxiv.org
Cyclostationarity involves periodic statistical variations in signals and processes, commonly
used in signal analysis and network security. In the context of attacks, cyclostationarity helps …