Malware Detection Method

Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers

Authors: Alfonso Iacovazzi, Shahid Raza | Published: 2023-06-26
Dataset Generation
Data Collection
Malware Detection Method

Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices

Authors: Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Merouane Debbah, Thierry Lestable, Narinderjit Singh Thandi | Published: 2023-06-25 | Updated: 2024-02-08
Malware Detection Method
Feature Extraction Method
Natural Language Processing

Federated Learning Approach for Distributed Ransomware Analysis

Authors: Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno | Published: 2023-06-25
Malware Classification
Malware Detection Method
Federated Learning

Creating Valid Adversarial Examples of Malware

Authors: Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia | Published: 2023-06-23
Malware Classification
Malware Detection Method
Adversarial attack

Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection

Authors: Mert Nakıp, Baran Can Gül, Erol Gelenbe | Published: 2023-06-22 | Updated: 2023-11-28
Algorithm Design
Malware Detection Method
Federated Learning

FLAG: Finding Line Anomalies (in code) with Generative AI

Authors: Baleegh Ahmad, Benjamin Tan, Ramesh Karri, Hammond Pearce | Published: 2023-06-22
Program Analysis
Malware Detection Method
Feature Extraction Method

Combining Generators of Adversarial Malware Examples to Increase Evasion Rate

Authors: Matouš Kozák, Martin Jureček | Published: 2023-04-14
Program Verification
Malware Detection Method
Generative Adversarial Network

Ransomware Detection and Classification Strategies

Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli | Published: 2023-04-10
Network Threat Detection
Malware Detection Method
Machine Learning Technology

Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms

Authors: Zihao Wang, Vrizlynn L. L. Thing | Published: 2023-04-07
Protocol Performance Evaluation
Malware Detection Method
Feature Extraction Method

Analysis, Detection, and Classification of Android Malware using System Calls

Authors: Shubham Shakya, Mayank Dave | Published: 2022-08-12
Malware Classification
Malware Detection Method
Attack Method