Results 71 to 80 of about 81,305 (190)
Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks
Malware still constitutes a major threat in the cybersecurity landscape, also due to the widespread use of infection vectors such as documents. These infection vectors hide embedded malicious code to the victim users, facilitating the use of social ...
Biggio, Battista +2 more
core +1 more source
Cyberattacks on Small Banks and the Impact on Local Banking Markets
Abstract Cyberattacks on small banks have direct and spillover effects in local markets. Following successful cyberattacks, hacked small banks experience a decline in deposit growth rates. This effect of cyberattacks is not observed in hacked large banks.
FABIAN GOGOLIN +2 more
wiley +1 more source
Malware and Malware Detection Techniques: A Survey
Abstract: Malicious software is a kind of software or codes which took some: private data, information from the PC framework, its tasks is to do only malicious objectives to the PC framework, without authorization of the PC clients. The effect of malicious software are worsen to the client.
Sahil Sehrawat, Dr. Dinesh Singh
openaire +1 more source
Traditional malware classification relies on known malware types and significantly large datasets labeled manually which limits its ability to recognize new malware classes.
Zhijie Tang, Peng Wang, Junfeng Wang
doaj +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
A3CM: Automatic Capability Annotation for Android Malware
Android malware poses serious security and privacy threats to the mobile users. Traditional malware detection and family classification technologies are becoming less effective due to the rapid evolution of the malware landscape, with the emerging of so ...
Junyang Qiu +6 more
doaj +1 more source
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
Generating Synthetic Malware Samples Using Generative AI
Malware attacks have a significant negative impact on organizations of varied scales in the field of cybersecurity. Recently, malware researchers have increasingly turned to machine learning techniques to combat sophisticated obfuscation methods used in ...
Tiffany Bao +4 more
doaj +1 more source
CAR‐T Cells: Current Status, Challenges, and Future Prospects
This graphical abstract outlines the current status, challenges, and future prospects of CAR‐T cells. The biological basis of CAR‐T cell therapy is the elegant redirection of adaptive immunity. Its initial successes have exposed a landscape of multifaceted challenges.
Aya Sedky Adly +6 more
wiley +1 more source
RogueGPT: Unleashing Jailbreak Prompts on LLMs
ABSTRACT Large Language Models (LLMs) have seen a remarkable surge in popularity since the latter part of 2022. These models have become vital in the lives of individuals from varying professions. While some users leverage LLMs for academic or informational purposes, others exploit them for illicit activities.
Arpitha Shivaswaroopa +4 more
wiley +1 more source

