You are currently on the new version of our website. Access the old version .

74 Results Found

  • Article
  • Open Access
5 Citations
3,319 Views
19 Pages

Obfuscation and cryptography technologies are applied to malware to make the detection of malware through intrusion prevention systems (IPSs), intrusion detection systems (IDSs), and antiviruses difficult. To address this problem, the security requir...

  • Article
  • Open Access
5 Citations
5,844 Views
18 Pages

Combating the OS-level malware is a very challenging problem as this type of malware can compromise the operating system, obtaining the kernel privilege and subverting almost all the existing anti-malware tools. This work aims to address this problem...

  • Article
  • Open Access
1 Citations
904 Views
22 Pages

19 November 2025

The explosive growth in Internet of Things (IoT) technologies has given rise to significant security concerns, especially with the emergence of sophisticated and zero-day malware attacks. Conventional malware detection methods based on static or dyna...

  • Article
  • Open Access
2 Citations
2,117 Views
21 Pages

LEDA—Layered Event-Based Malware Detection Architecture

  • Radu Marian Portase,
  • Raluca Laura Portase,
  • Adrian Colesa and
  • Gheorghe Sebestyen

2 October 2024

The rapid increase in new malware necessitates effective detection methods. While machine learning techniques have shown promise for malware detection, most research focuses on identifying malware through the content of executable files or full behav...

  • Article
  • Open Access
25 Citations
7,966 Views
22 Pages

20 September 2024

The Internet of Things (IoT), introduced by Kevin Ashton in the late 1990s, has transformed technology usage globally, enhancing efficiency and convenience but also posing significant security challenges. With the proliferation of IoT devices expecte...

  • Article
  • Open Access
3 Citations
4,720 Views
13 Pages

A Cloud-Based Real-Time Mechanism to Protect End Hosts against Malware

  • Fu-Hau Hsu,
  • Chia-Hao Lee,
  • Ting Luo,
  • Ting-Cheng Chang and
  • Min-Hao Wu

8 September 2019

Nowadays, antivirus is one of the most popular tools used to protect computer systems. Diverse antivirus vendors are established to protect their customers against malware. However, antivirus is facing some critical problems, such as significant dete...

  • Article
  • Open Access
99 Citations
17,320 Views
12 Pages

3 November 2022

Cyber-attacks on the numerous parts of today’s fast developing IoT are only going to increase in frequency and severity. A reliable method for detecting malicious attacks such as botnet in the IoT environment is critical for reducing security r...

  • Review
  • Open Access
81 Citations
21,573 Views
30 Pages

A Survey of the Recent Trends in Deep Learning Based Malware Detection

  • Umm-e-Hani Tayyab,
  • Faiza Babar Khan,
  • Muhammad Hanif Durad,
  • Asifullah Khan and
  • Yeon Soo Lee

28 September 2022

Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying malicious activity. Malicious activities potentially lead to a system breach or data compromise. Various tools and anti-malware products exist for the detection of m...

  • Article
  • Open Access
9 Citations
4,729 Views
22 Pages

Effective ML-Based Android Malware Detection and Categorization

  • Areej Alhogail and
  • Rawan Abdulaziz Alharbi

The rapid proliferation of malware poses a significant challenge regarding digital security, necessitating the development of advanced techniques for malware detection and categorization. In this study, we investigate Android malware detection and ca...

  • Article
  • Open Access
92 Citations
34,965 Views
24 Pages

Artificial Intelligence-Based Malware Detection, Analysis, and Mitigation

  • Amir Djenna,
  • Ahmed Bouridane,
  • Saddaf Rubab and
  • Ibrahim Moussa Marou

8 March 2023

Malware, a lethal weapon of cyber attackers, is becoming increasingly sophisticated, with rapid deployment and self-propagation. In addition, modern malware is one of the most devastating forms of cybercrime, as it can avoid detection, make digital f...

  • Article
  • Open Access
1,088 Views
24 Pages

5 November 2025

Recent advancements in cyber threats have led to increasingly sophisticated attack methods that evade traditional malware detection systems. In-memory malware, a particularly challenging variant, operates by modifying volatile memory, leaving minimal...

  • Article
  • Open Access
11 Citations
4,702 Views
15 Pages

A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware

  • Muhammad Haris Khan Abbasi,
  • Subhan Ullah,
  • Tahir Ahmad and
  • Attaullah Buriro

4 February 2023

Cryptojacking is a type of computer piracy in which a hacker uses a victim’s computer resources, without their knowledge or consent, to mine for cryptocurrency. This is made possible by new memory-based cryptomining techniques and the growth of...

  • Article
  • Open Access
4 Citations
2,490 Views
12 Pages

2 November 2023

Malware in today’s business world has become a powerful tool used by cyber attackers. It has become more advanced, spreading quickly and causing significant harm. Modern malware is particularly dangerous because it can go undetected, making it...

  • Article
  • Open Access
47 Citations
10,284 Views
25 Pages

30 July 2022

The smart factory environment has been transformed into an Industrial Internet of Things (IIoT) environment, which is an interconnected and open approach. This has made smart manufacturing plants vulnerable to cyberattacks that can directly lead to p...

  • Article
  • Open Access
6 Citations
5,704 Views
37 Pages

Early Ransomware Detection with Deep Learning Models

  • Matan Davidian,
  • Michael Kiperberg and
  • Natalia Vanetik

11 August 2024

Ransomware is a growing-in-popularity type of malware that restricts access to the victim’s system or data until a ransom is paid. Traditional detection methods rely on analyzing the malware’s content, but these methods are ineffective ag...

  • Article
  • Open Access
26 Citations
12,066 Views
29 Pages

Improving the Robustness of AI-Based Malware Detection Using Adversarial Machine Learning

  • Shruti Patil,
  • Vijayakumar Varadarajan,
  • Devika Walimbe,
  • Siddharth Gulechha,
  • Sushant Shenoy,
  • Aditya Raina and
  • Ketan Kotecha

15 October 2021

Cyber security is used to protect and safeguard computers and various networks from ill-intended digital threats and attacks. It is getting more difficult in the information age due to the explosion of data and technology. There is a drastic rise in...

  • Article
  • Open Access
39 Citations
8,035 Views
33 Pages

28 July 2023

In this study, the methodology of cyber-resilience in small and medium-sized organizations (SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware analysis, detection and response using open-source solutions is proposed fo...

  • Article
  • Open Access
34 Citations
6,761 Views
15 Pages

27 April 2019

Domain generation algorithms (DGAs) represent a class of malware used to generate large numbers of new domain names to achieve command-and-control (C2) communication between the malware program and its C2 server to avoid detection by cybersecurity me...

  • Article
  • Open Access
38 Citations
4,342 Views
21 Pages

Optimized and Efficient Image-Based IoT Malware Detection Method

  • Amir El-Ghamry,
  • Tarek Gaber,
  • Kamel K. Mohammed and
  • Aboul Ella Hassanien

With the widespread use of IoT applications, malware has become a difficult and sophisticated threat. Without robust security measures, a massive volume of confidential and classified data could be exposed to vulnerabilities through which hackers cou...

  • Review
  • Open Access
706 Views
18 Pages

25 November 2025

The Aho-Corasick (AC) algorithm remains one of the most influential developments in deterministic multi-pattern matching due to its ability to recognize multiple strings in linear time within a single data stream. Originally conceived for bibliograph...

  • Article
  • Open Access
9 Citations
3,556 Views
13 Pages

Features Engineering to Differentiate between Malware and Legitimate Software

  • Ammar Yahya Daeef,
  • Ali Al-Naji,
  • Ali K. Nahar and
  • Javaan Chahl

3 February 2023

Malware is the primary attack vector against the modern enterprise. Therefore, it is crucial for businesses to exclude malware from their computer systems. The most responsive solution to this issue would operate in real time at the edge of the IT sy...

  • Article
  • Open Access
1 Citations
1,675 Views
20 Pages

27 August 2025

Ransomware encrypts targeted files, making recovery difficult using conventional disinfection or deletion methods, unlike other types of malware. In particular, ransomware commonly encrypts important documents as a follow-up action, and existing anti...

  • Article
  • Open Access
2 Citations
3,257 Views
27 Pages

An Explainable Hybrid CNN–Transformer Architecture for Visual Malware Classification

  • Mohammed Alshomrani,
  • Aiiad Albeshri,
  • Abdulaziz A. Alsulami and
  • Badraddin Alturki

24 July 2025

Malware continues to develop, posing significant challenges for traditional signature-based detection systems. Visual malware classification, which transforms malware binaries into grayscale images, has emerged as a promising alternative for recogniz...

  • Article
  • Open Access
908 Views
21 Pages

Lightweight Quantized XGBoost for Botnet Detection in Resource-Constrained IoT Networks

  • Mohammed Rauf Ali Khan,
  • Abdulaziz Y. Barnawi,
  • Adnan Munir,
  • Zainab Alsalman and
  • Dario Marcelo Satan Sanunga

18 November 2025

The rapid expansion of IoT devices has introduced significant security challenges, with malware authors constantly evolving their techniques to exploit vulnerabilities in IoT networks. Despite this growing threat, progress in developing effective det...

  • Article
  • Open Access
6 Citations
1,953 Views
20 Pages

28 May 2024

Detecting malware is a crucial defense mechanism against potential cyber-attacks. However, current methods illustrate significant limitations in achieving high performance while maintaining faster inference on edge devices. This study proposes a nove...

  • Article
  • Open Access
2,829 Views
12 Pages

Unexpected-Behavior Detection Using TopK Rankings for Cybersecurity

  • Alvaro Parres-Peredo,
  • Ivan Piza-Davila and
  • Francisco Cervantes

17 October 2019

Anomaly-based intrusion detection systems use profiles to characterize expected behavior of network users. Most of these systems characterize the entire network traffic within a single profile. This work proposes a user-level anomaly-based intrusion...

  • Article
  • Open Access
231 Views
29 Pages

10 December 2025

In this paper, we propose the Adaptive Volcano Support Vector Machine (AVSVM)—a novel classification model inspired by the dynamic behavior of volcanic eruptions—for the purpose of enhancing malware detection. Unlike conventional SVMs tha...

  • Article
  • Open Access
925 Views
25 Pages

21 November 2025

Mobile devices are frequent targets of malware due to the large volume of sensitive personal, financial, and corporate data they process. Traditional static, dynamic, and hybrid analysis methods are increasingly insufficient against evolving threats....

  • Article
  • Open Access
1 Citations
2,348 Views
28 Pages

As Android malware grows increasingly sophisticated, traditional detection methods struggle to keep pace, creating an urgent need for robust, interpretable, and real-time solutions to safeguard mobile ecosystems. This study introduces YoloMal-XAI, a...

  • Article
  • Open Access
11 Citations
4,724 Views
21 Pages

With the widespread use of computers, the amount of malware has increased exponentially. Since dynamic detection is costly in both time and resources, most existing malware detection methods are based on static features. However, existing static meth...

  • Article
  • Open Access
4 Citations
3,348 Views
20 Pages

MalFe—Malware Feature Engineering Generation Platform

  • Avinash Singh,
  • Richard Adeyemi Ikuesan and
  • Hein Venter

8 October 2023

The growing sophistication of malware has resulted in diverse challenges, especially among security researchers who are expected to develop mechanisms to thwart these malicious attacks. While security researchers have turned to machine learning to co...

  • Article
  • Open Access
1,201 Views
14 Pages

31 October 2025

Identifying malware families is vital for predicting attack campaigns and creating effective defense strategies. Traditional signature-based methods are insufficient against new and evasive malware, highlighting the need for adaptive, multimodal solu...

  • Article
  • Open Access
2 Citations
1,837 Views
17 Pages

HoneyLite: A Lightweight Honeypot Security Solution for SMEs

  • Nurayn AlQahtan,
  • Aseel AlOlayan,
  • AbdulAziz AlAjaji and
  • Abdulaziz Almaslukh

21 August 2025

Small and medium-sized enterprises (SMEs) are increasingly targeted by cyber threats but often lack the financial and technical resources to implement advanced security systems. This paper presents HoneyLite, a lightweight and dynamic honeypot-based...

  • Article
  • Open Access
3 Citations
4,978 Views
26 Pages

MPSD: A Robust Defense Mechanism against Malicious PowerShell Scripts in Windows Systems

  • Min-Hao Wu,
  • Fu-Hau Hsu,
  • Jian-Hong Hunag,
  • Keyuan Wang,
  • Yen-Yu Liu,
  • Jian-Xin Chen,
  • Hao-Jyun Wang and
  • Hao-Tsung Yang

19 September 2024

This manuscript introduces MPSD (Malicious PowerShell Script Detector), an advanced tool to protect Windows systems from malicious PowerShell commands and scripts commonly used in fileless malware attacks. These scripts are often hidden in Office doc...

  • Article
  • Open Access
16 Citations
3,326 Views
17 Pages

Exploring Lightweight Deep Learning Solution for Malware Detection in IoT Constraint Environment

  • Abdur Rehman Khan,
  • Amanullah Yasin,
  • Syed Muhammad Usman,
  • Saddam Hussain,
  • Shehzad Khalid and
  • Syed Sajid Ullah

12 December 2022

The present era is facing the industrial revolution. Machine-to-Machine (M2M) communication paradigm is becoming prevalent. Resultantly, the computational capabilities are being embedded in everyday objects called things. When connected to the intern...

  • Review
  • Open Access
27 Citations
6,777 Views
30 Pages

Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning

  • Worku Gachena Negera,
  • Friedhelm Schwenker,
  • Taye Girma Debelee,
  • Henock Mulugeta Melaku and
  • Yehualashet Megeresa Ayano

14 December 2022

The orchestration of software-defined networks (SDN) and the internet of things (IoT) has revolutionized the computing fields. These include the broad spectrum of connectivity to sensors and electronic appliances beyond standard computing devices. Ho...

  • Article
  • Open Access
46 Citations
6,689 Views
22 Pages

14 November 2019

We present an innovative approach for a Cybersecurity Solution based on the Intrusion Detection System to detect malicious activity targeting the Distributed Network Protocol (DNP3) layers in the Supervisory Control and Data Acquisition (SCADA) syste...

  • Feature Paper
  • Article
  • Open Access
3,549 Views
44 Pages

19 October 2025

The widespread integration of Internet-connected devices into industrial environments has enhanced connectivity and automation but has also increased the exposure of industrial cyber–physical systems to security threats. Detecting anomalies is...

  • Article
  • Open Access
1 Citations
3,419 Views
14 Pages

Towards a Near-Real-Time Protocol Tunneling Detector Based on Machine Learning Techniques

  • Filippo Sobrero,
  • Beatrice Clavarezza,
  • Daniele Ucci and
  • Federica Bisio

6 November 2023

In the very recent years, cybersecurity attacks have increased at an unprecedented pace, becoming ever more sophisticated and costly. Their impact has involved both private/public companies and critical infrastructures. At the same time, due to the C...

  • Article
  • Open Access
76 Citations
10,896 Views
31 Pages

Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments

  • Lorenzo Fernández Maimó,
  • Alberto Huertas Celdrán,
  • Ángel L. Perales Gómez,
  • Félix J. García Clemente,
  • James Weimer and
  • Insup Lee

5 March 2019

Medical Cyber-Physical Systems (MCPS) hold the promise of reducing human errors and optimizing healthcare by delivering new ways to monitor, diagnose and treat patients through integrated clinical environments (ICE). Despite the benefits provided by...

  • Article
  • Open Access
5 Citations
2,524 Views
21 Pages

SSCL-TransMD: Semi-Supervised Continual Learning Transformer for Malicious Software Detection

  • Liang Kou,
  • Donghui Zhao,
  • Hui Han,
  • Xiong Xu,
  • Shuaige Gong and
  • Liandong Wang

13 November 2023

Machine learning-based malware (malicious software) detection methods have a wide range of real-world applications. However, these types of approaches suffer from the fatal problem of “model aging”, in which the validity of the model decr...

  • Article
  • Open Access
7 Citations
2,949 Views
19 Pages

21 November 2023

Malware detection using hybrid features, combining binary and hexadecimal analysis with DLL calls, is crucial for leveraging the strengths of both static and dynamic analysis methods. Artificial intelligence (AI) enhances this process by enabling aut...

  • Article
  • Open Access
37 Citations
5,398 Views
20 Pages

Many Internet of Things (IoT) services are currently tracked and regulated via mobile devices, making them vulnerable to privacy attacks and exploitation by various malicious applications. Current solutions are unable to keep pace with the rapid grow...

  • Article
  • Open Access
2 Citations
2,892 Views
25 Pages

21 October 2022

Symmetric and asymmetric patterns are fascinating phenomena that show a level of co-existence in mobile application behavior analyses. For example, static phenomena, such as information sharing through collaboration with known apps, is a good example...

  • Article
  • Open Access
44 Citations
8,800 Views
25 Pages

Attackers are perpetually modifying their tactics to avoid detection and frequently leverage legitimate credentials with trusted tools already deployed in a network environment, making it difficult for organizations to proactively identify critical s...

  • Article
  • Open Access
21 Citations
4,887 Views
20 Pages

On the Feasibility of Adversarial Sample Creation Using the Android System API

  • Fabrizio Cara,
  • Michele Scalas,
  • Giorgio Giacinto and
  • Davide Maiorca

10 September 2020

Due to its popularity, the Android operating system is a critical target for malware attacks. Multiple security efforts have been made on the design of malware detection systems to identify potentially harmful applications. In this sense, machine lea...

  • Article
  • Open Access
19 Citations
3,872 Views
27 Pages

4 May 2023

Nowadays, ransomware is considered one of the most critical cyber-malware categories. In recent years various malware detection and classification approaches have been proposed to analyze and explore malicious software precisely. Malware originators...

  • Article
  • Open Access
7 Citations
3,082 Views
16 Pages

Open Set Recognition for Malware Traffic via Predictive Uncertainty

  • Xue Li,
  • Jinlong Fei,
  • Jiangtao Xie,
  • Ding Li,
  • Heng Jiang,
  • Ruonan Wang and
  • Zan Qi

Existing machine learning-based malware traffic recognition techniques can effectively detect abnormal behaviors in the network. However, almost all of them focus on a closed-set scenario in which the data used for training and testing come from the...

  • Review
  • Open Access
1 Citations
2,507 Views
25 Pages

Survey of Federated Learning for Cyber Threat Intelligence in Industrial IoT: Techniques, Applications and Deployment Models

  • Abin Kumbalapalliyil Tom,
  • Ansam Khraisat,
  • Tony Jan,
  • Md Whaiduzzaman,
  • Thien D. Nguyen and
  • Ammar Alazab

8 September 2025

The Industrial Internet of Things (IIoT) is transforming industrial operations through connected devices and real-time automation but also introduces significant cybersecurity risks. Cyber threat intelligence (CTI) is critical for detecting and mitig...

  • Article
  • Open Access
21 Citations
4,942 Views
18 Pages

An Effective Self-Configurable Ransomware Prevention Technique for IoMT

  • Usman Tariq,
  • Imdad Ullah,
  • Mohammed Yousuf Uddin and
  • Se Jin Kwon

4 November 2022

Remote healthcare systems and applications are being enabled via the Internet of Medical Things (IoMT), which is an automated system that facilitates the critical and emergency healthcare services in urban areas, in addition to, bridges the isolated...

of 2