|
|
|
Jeonggeun Jo, Jaeik Cho and Jongsub Moon
Artificial intelligence (AI) is increasingly being utilized in cybersecurity, particularly for detecting malicious applications. However, the black-box nature of AI models presents a significant challenge. This lack of transparency makes it difficult to ...
ver más
|
|
|
|
|
|
Omar Azib Alkhudaydi, Moez Krichen and Ans D. Alghamdi
With the increasing severity and frequency of cyberattacks, the rapid expansion of smart objects intensifies cybersecurity threats. The vast communication traffic data between Internet of Things (IoT) devices presents a considerable challenge in defendin...
ver más
|
|
|
|
|
|
Mehdi Sadi, Bashir Mohammad Sabquat Bahar Talukder, Kaniz Mishty and Md Tauhidur Rahman
Universal adversarial perturbations are image-agnostic and model-independent noise that, when added to any image, can mislead the trained deep convolutional neural networks into the wrong prediction. Since these universal adversarial perturbations can se...
ver más
|
|
|
|
|
|
Abishek Manikandaraja, Peter Aaby and Nikolaos Pitropakis
Artificial intelligence and machine learning have become a necessary part of modern living along with the increased adoption of new computational devices. Because machine learning and artificial intelligence can detect malware better than traditional sig...
ver más
|
|
|
|
|
|
Betty Saridou, Isidoros Moulas, Stavros Shiaeles and Basil Papadopoulos
Image conversion of malicious binaries, or binary visualisation, is a relevant approach in the security community. Recently, it has exceeded the role of a single-file malware analysis tool and has become a part of Intrusion Detection Systems (IDSs) thank...
ver más
|
|
|