Results 41 to 50 of about 10,938 (187)

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

Dynamic Analysis of Executables to Detect and Characterize Malware

open access: yes, 2018
It is needed to ensure the integrity of systems that process sensitive information and control many aspects of everyday life. We examine the use of machine learning algorithms to detect malware using the system calls generated by executables-alleviating ...
Aimone, James B.   +6 more
core   +1 more source

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

MalGraphIQ: A tool for generating behavior representations of malware execution traces

open access: yesSoftwareX
Understanding and interpreting malware behavior remains an open challenge in the field of cybersecurity. The dynamic analysis of malware execution traces has emerged as a promising approach for discovering behavioral insights that allow the visual ...
Razvan Raducu   +2 more
doaj   +1 more source

R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections

open access: yes, 2018
The influence of Deep Learning on image identification and natural language processing has attracted enormous attention globally. The convolution neural network that can learn without prior extraction of features fits well in response to the rapid ...
Huang, TonTon Hsien-De, Kao, Hung-Yu
core   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Android Malware Classification Based on Fuzzy Hashing Visualization

open access: yesMachine Learning and Knowledge Extraction, 2023
The proliferation of Android-based devices has brought about an unprecedented surge in mobile application usage, making the Android ecosystem a prime target for cybercriminals.
Horacio Rodriguez-Bazan   +2 more
doaj   +1 more source

DQN‐Guided Subset‐Induced OCSVM Kernel Approximation for Imbalanced Anomaly Detection

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
Anomaly detection under limited normal data remains a fundamental challenge due to severe class imbalance and scarcity of anomalies. We propose a novel framework that reformulates support vector selection in One‐Class SVM as a sequential decision‐making problem.
Wenqian Yu, Jiaying Wu, Jinglu Hu
wiley   +1 more source

Application of Entropy Visualization Method in Malware Classification [PDF]

open access: yesJisuanji gongcheng, 2017
Soaring malwares threat the security of information systems.For increasing identification efficiency and improving response speed,this paper presents a new malware visualization method for classification based on Shannon entropy,Jaccard index and K ...
REN Zhuojun,CHEN Guang
doaj   +1 more source

Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis

open access: yesJournal of Cybersecurity and Privacy, 2021
The evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily.
Moses Ashawa, Sarah Morris
doaj   +1 more source

Home - About - Disclaimer - Privacy