Results 41 to 50 of about 25,310,274 (105)

Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection

open access: yes, 2017
In this paper, we introduce and evaluate PROPEDEUTICA, a novel methodology and framework for efficient and effective real-time malware detection, leveraging the best of conventional machine learning (ML) and deep learning (DL) algorithms. In PROPEDEUTICA,
Chen, Aokun   +7 more
core   +1 more source

Systematic Approach to Malware Analysis (SAMA)

open access: yesApplied Sciences, 2020
Malware threats pose new challenges to analytic and reverse engineering tasks. It is needed for a systematic approach to that analysis, in an attempt to fully uncover their underlying attack vectors and techniques and find commonalities between them.
Javier Bermejo Higuera   +4 more
semanticscholar   +1 more source

Neurlux: dynamic malware analysis without feature engineering [PDF]

open access: yesAsia-Pacific Computer Systems Architecture Conference, 2019
Malware detection plays a vital role in computer security. Modern machine learning approaches have been centered around domain knowledge for extracting malicious features.
Chani Jindal   +5 more
semanticscholar   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Malware detection techniques for mobile devices

open access: yes, 2017
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core   +1 more source

Dynamic Malware Analysis in the Modern Era—A State of the Art Survey

open access: yesACM Computing Surveys, 2019
Although malicious software (malware) has been around since the early days of computers, the sophistication and innovation of malware has increased over the years.
Ori Or-Meir   +3 more
semanticscholar   +1 more source

Cyberattacks on Small Banks and the Impact on Local Banking Markets

open access: yesJournal of Money, Credit and Banking, EarlyView.
Abstract Cyberattacks on small banks have direct and spillover effects in local markets. Following successful cyberattacks, hacked small banks experience a decline in deposit growth rates. This effect of cyberattacks is not observed in hacked large banks.
FABIAN GOGOLIN   +2 more
wiley   +1 more source

Evaluating the Impact of Malware Analysis Techniques for Securing Web Applications through a Decision-Making Framework under Fuzzy Environment

open access: yesInternational Journal of Intelligent Engineering and Systems, 2020
Nowadays, most of the cyber-attacks are initiated by extremely malicious programs known as Malware. Malwares are very vigorous and can penetrate the security of information and communication systems.
Rajeev Kumar   +5 more
semanticscholar   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud

open access: yesConference on Data and Application Security and Privacy, 2020
While the number of connected devices is constantly growing, we observe an increased incident rate of cyber attacks that target user data. Typically, personal devices contain the most sensitive information regarding their users, so there is no doubt that
Dimitris Deyannis   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy