Results 51 to 60 of about 25,310,274 (105)
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
An overview of ADSL homed nepenthes honeypots in Western Australia [PDF]
This paper outlines initial analysis from research in progress into ADSL homed Nepenthes honeypots. One of the Nepenthes honeypots prime objective in this research was the collection of malware for analysis and dissection.
Valli, Craig, Wooten, Aaron
core +1 more source
Fuzzy-Import Hashing: A Malware Analysis Approach
Malware has remained a consistent threat since its emergence, growing into a plethora of types and in large numbers. In recent years, numerous new malware variants have enabled the identification of new attack surfaces and vectors, and have become a ...
N. Naik +5 more
semanticscholar +1 more source
Accelerated‐USE: A Benchmark Framework for GPU‐Driven Graph Neural Network Training
ABSTRACT Graph processing is used in many domains to extract knowledge from real‐world data. With the rise of deep neural networks and scaled compute infrastructure in artificial intelligence (AI), specialized techniques emerged to leverage graphs in applications such as recommendation systems and social networks.
Lucas de Angelo Martins Ribeiro +5 more
wiley +1 more source
Android Malware Detection Using Support Vector Regression for Dynamic Feature Analysis
Mobile devices face significant security challenges due to the increasing proliferation of Android malware. This study introduces an innovative approach to Android malware detection, combining Support Vector Regression (SVR) and dynamic feature analysis ...
Nahier Aldhafferi
semanticscholar +1 more source
CAR‐T Cells: Current Status, Challenges, and Future Prospects
This graphical abstract outlines the current status, challenges, and future prospects of CAR‐T cells. The biological basis of CAR‐T cell therapy is the elegant redirection of adaptive immunity. Its initial successes have exposed a landscape of multifaceted challenges.
Aya Sedky Adly +6 more
wiley +1 more source
RogueGPT: Unleashing Jailbreak Prompts on LLMs
ABSTRACT Large Language Models (LLMs) have seen a remarkable surge in popularity since the latter part of 2022. These models have become vital in the lives of individuals from varying professions. While some users leverage LLMs for academic or informational purposes, others exploit them for illicit activities.
Arpitha Shivaswaroopa +4 more
wiley +1 more source
In past three decades almost everything has changed in the field of malware and malware analysis. From malware created as proof of some security concept and malware created for financial gain to malware created to sabotage infrastructure. In this work we
Milošević, Nikola
core
A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray +2 more
core +2 more sources
This study presents a lightweight and explainable ransomware detection framework using dynamic API‐call features and ensemble machine learning. The LightGBM model achieves high accuracy (AUC = 0.9937) with low false positives. SHAP‐based feature importance reveals key API behaviors enabling interpretable, efficient, and deployment‐ready ransomware ...
Zain ul Abideen Khan +4 more
wiley +1 more source

