Results 71 to 80 of about 29,821 (199)
File Entropy Signal Analysis Combined With Wavelet Decomposition for Malware Classification
With the rapid development of the Internet, malware variants have increased exponentially, which poses a key threat to cyber security. Persistent efforts have been made to classify malware variants, but there are still many challenges, including the ...
Hui Guo +5 more
doaj +1 more source
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
Malware Classification Using Ensemble Classifiers [PDF]
Antimalware offers detection mechanism to detect and take appropriate action against malware detected. To evade detection, malware authors had introduced polymorphism to malware. In order to be effectively analyzing and classifying large amount of malware, it is necessary to group and identify them into their corresponding families.
Mohd Hanafi Ahmad Hijazi +4 more
openaire +1 more source
MCPDS: image-based malware classification method using PE metadata alone
In response to the increasing threat posed by the exponential growth of malware in cybersecurity, researchers have developed a number of malware classification methods based on malware images and deep learning in recent years.
Yonglin Zhao +5 more
doaj +1 more source
Accelerated‐USE: A Benchmark Framework for GPU‐Driven Graph Neural Network Training
ABSTRACT Graph processing is used in many domains to extract knowledge from real‐world data. With the rise of deep neural networks and scaled compute infrastructure in artificial intelligence (AI), specialized techniques emerged to leverage graphs in applications such as recommendation systems and social networks.
Lucas de Angelo Martins Ribeiro +5 more
wiley +1 more source
Classification of Malware Images Using Fine-Tunned ViT
Malware detection and classification have become critical tasks in ensuring the security and integrity of computer systems and networks. Traditional methods of malware analysis often rely on signature-based approaches, which struggle to cope with the ...
Özal Yıldırım, Oğuzhan Katar
doaj +1 more source
CAR‐T Cells: Current Status, Challenges, and Future Prospects
This graphical abstract outlines the current status, challenges, and future prospects of CAR‐T cells. The biological basis of CAR‐T cell therapy is the elegant redirection of adaptive immunity. Its initial successes have exposed a landscape of multifaceted challenges.
Aya Sedky Adly +6 more
wiley +1 more source
RogueGPT: Unleashing Jailbreak Prompts on LLMs
ABSTRACT Large Language Models (LLMs) have seen a remarkable surge in popularity since the latter part of 2022. These models have become vital in the lives of individuals from varying professions. While some users leverage LLMs for academic or informational purposes, others exploit them for illicit activities.
Arpitha Shivaswaroopa +4 more
wiley +1 more source
This study presents a lightweight and explainable ransomware detection framework using dynamic API‐call features and ensemble machine learning. The LightGBM model achieves high accuracy (AUC = 0.9937) with low false positives. SHAP‐based feature importance reveals key API behaviors enabling interpretable, efficient, and deployment‐ready ransomware ...
Zain ul Abideen Khan +4 more
wiley +1 more source
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim +4 more
wiley +1 more source

