Results 61 to 70 of about 6,970 (211)
This paper proposes SQLi‐ScanEval Framework, a standardized SQLi detection system that integrates vulnerability and penetration testing scanners into a standardized framework. It tested seven prominent SQLi vulnerability scanners including OWASP ZAP, Wapiti, Vega, Acunetix, Invicti, Burp Suite, and Arachni on two prominent vulnerable testing ...
Hajira Bashir +6 more
wiley +1 more source
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
Reverse Engineering untuk Analisis Malware Remote Access Trojan
Para hacker menggunakan malware Remote Access Trojan untuk merusak sistem kemudian mencuri data para korbannya. Diperlukan analisis mendalam mengenai malware baru-baru ini karena malware dapat berkamuflase seperti sistem tidak dicurigai.
Tesa Pajar Setia +2 more
doaj +1 more source
Event Log Correlation for Multi‐Step Attack Detection
ABSTRACT Event log correlation (ELC) is central to detecting multi‐step attacks (MSAD) that unfold across heterogeneous systems and long time horizons. This review synthesises ELC families—mining/sequence, graph learning, provenance/causal correlation, and hybrid LLM‐assisted approaches—through an MSAD‐first lens that ties methods to attack stages and ...
Syed Usman Shaukat +2 more
wiley +1 more source
A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed +4 more
wiley +1 more source
Guardians of ICS: A Comparative Analysis of Anomaly Detection Techniques
This study presents a comparative evaluation of supervised and unsupervised learning models for anomaly detection in industrial control systems (ICS), using data from the SWaT testbed. Results show that although supervised models offer higher precision, they miss more unknown attacks, whereas unsupervised models achieve better recall but with increased
Zequn Wang +4 more
wiley +1 more source
Deep Belief Networks-based framework for malware detection in Android systems
Malware is the umbrella term that denotes attacking any system by malicious software. During the last few years, the popularity of Android smartphones led to the sneak of several malware applications into different Android markets without any difficulty.
Dina Saif, S.M. El-Gokhy, E. Sallam
doaj +1 more source
Undecidable problems in malware analysis
Malware analysis is a challenging task in the theory as well as the practice of computer science. Many important problems in malware analysis have been shown to be undecidable. These problems include virus detection, detecting unpacking execution, matching malware samples against a set of given templates, and detecting trigger-based behavior.
Batur, Berker +2 more
openaire +2 more sources
This paper proposes a novel malware propagation model based on epidemiological theory, specifically tailored for hierarchically protected wireless sensor networks (WSNs). We classify nodes into strongly and weakly protected categories and establish a four‐state propagation dynamics model (susceptible, exposed, infected, and recovered) to simulate ...
Xuejin Zhu, Nan Fu
wiley +1 more source
I-MCM: IoT Malware Counter Measures for Cross-Architecture IoT Malware Detection
The recent attacks initiated by malware-infected IoT devices illustrate that these attacks have tremendous impacts not only on the targeted systems but also on the entire internet infrastructure.
Ibrahim Gulatas +3 more
doaj +1 more source

