Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

Applying NLP techniques to malware detection in a practical environment

M Mimura, R Ito - International Journal of Information Security, 2022 - Springer
Executable files still remain popular to compromise the endpoint computers. These
executable files are often obfuscated to avoid anti-virus programs. To examine all suspicious …

Soda: A system for cyber deception orchestration and automation

MSI Sajid, J Wei, B Abdeen, E Al-Shaer… - Proceedings of the 37th …, 2021 - dl.acm.org
Active Cyber Deception (ACD) has emerged as an effective proactive cyber defense
technique that can mislead adversaries by presenting falsified data and allow opportunities …

Effective methods to detect metamorphic malware: a systematic review

M Irshad, HM Al-Khateeb, A Mansour… - International …, 2018 - inderscienceonline.com
The succeeding code for metamorphic malware is routinely rewritten to remain stealthy and
undetected within infected environments. This characteristic is maintained by means of …

IRMD: malware variant detection using opcode image recognition

J Zhang, Z Qin, H Yin, L Ou, Y Hu - 2016 IEEE 22nd …, 2016 - ieeexplore.ieee.org
Malware detection becomes mission critical as its threats spread from personal computers to
industrial control systems. Modern malware generally equips with sophisticated anti …

[HTML][HTML] Impact of benign sample size on binary classification accuracy

M Mimura - Expert Systems with Applications, 2023 - Elsevier
Recently, there has been a significant increase in malware attacks and malicious traffic.
Consequently, several machine learning-based detection models have been developed to …

SymbSODA: configurable and verifiable orchestration automation for active malware deception

MSI Sajid, J Wei, E Al-Shaer, Q Duan… - ACM Transactions on …, 2023 - dl.acm.org
Malware is commonly used by adversaries to compromise and infiltrate cyber systems in
order to steal sensitive information or destroy critical assets. Active Cyber Deception (ACD) …

Graph-based malware detection using opcode sequences

S Gülmez, I Sogukpinar - 2021 9th International Symposium on …, 2021 - ieeexplore.ieee.org
The impact of malware grows for IT (information technology) systems day by day. The
number, the complexity, and the cost of them increase rapidly. While researchers are …

Malware detection using machine learning based on word2vec embeddings of machine code instructions

I Popov - 2017 Siberian symposium on data science and …, 2017 - ieeexplore.ieee.org
Applying machine learning for automatic malware detection is a perspective field of scientific
research. One of popular methods in static analysis of executable files is observing machine …

[HTML][HTML] Evaluation of printable character-based malicious PE file-detection method

M Mimura - Internet of Things, 2022 - Elsevier
Printable characters extracted from portable executable (PE) files are a common surface
analysis feature. String extraction is a supplemental feature for malware analysis. Recent …