Relational Framework of Cyberattacks: Empirical Evidence from Multistage Incidents. [PDF]
Ferrer-Oliva M +3 more
europepmc +1 more source
Application of representation learning in detecting botnet attacks. [PDF]
Le Ngoc H.
europepmc +1 more source
HoneyLite: A Lightweight Honeypot Security Solution for SMEs. [PDF]
AlQahtan N +3 more
europepmc +1 more source
Detecting malicious code variants using convolutional neural network (CNN) with transfer learning. [PDF]
Younas N +5 more
europepmc +1 more source
In-Memory Shellcode Runner Detection in Internet of Things (IoT) Networks: A Lightweight Behavioral and Semantic Analysis Framework. [PDF]
Dora JR, Hluchý L, Staňo M.
europepmc +1 more source
Adaptive malware identification via integrated SimCLR and GRU networks. [PDF]
Alsubaei FS +5 more
europepmc +1 more source
Mathematical analysis of the dynamics of cyberattack propagation in IoT networks. [PDF]
AbuHour Y +4 more
europepmc +1 more source
Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms. [PDF]
Alohali MA +7 more
europepmc +1 more source
Malware Classification Using Machine Learning and Binary Visualization
TaeGuen Kim, HwanTae Ji, Eul Gyu Im
openaire +1 more source
A dataset of windows system binaries and similarity digests for enhanced forensic analysis. [PDF]
Huici D, Rodríguez RJ.
europepmc +1 more source

