Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 120, Issue CSep 2022
Publisher:
  • Elsevier Advanced Technology Publications
  • P.O. Box 150 Kidlington, Oxford OX5 1AS
  • United Kingdom
ISSN:0167-4048
Reflects downloads up to 20 Nov 2024Bibliometrics
research-article
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text
Abstract

To counteract the rapidly evolving cyber threats, many research efforts have been made to design cyber threat intelligence (CTI) systems that extract CTI data from publicly available sources. Specifically, indicators of compromise (IOC)...

research-article
Organizational and team culture as antecedents of protection motivation among IT employees
Abstract

The rapid development of technology and information systems has led to higher information security-related issues in an organization. The age of remote working (i.e., telecommuting) has further increased information security related ...

review-article
A comprehensive survey of covert communication techniques, limitations and future challenges
Abstract

Data encryption aims to protect the confidentiality of data at storage, during transmission, or while in processing. However, it is not always the optimum choice as attackers know the existence of the ciphertext. Hence, they can ...

research-article
LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning
Abstract

Recently, privacy-preserving machine learning (PPML) has received a lot of research attention, due to the increasing demand for multiple data owners in training machine learning models. Thus, many works have been proposed for privacy-...

research-article
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications
Abstract

Intrusion Detection Systems (IDS) based on deep learning models can identify and mitigate cyberattacks in IoT applications in a resilient and systematic manner. These models, which support the IDS’s decision, could be vulnerable to a ...

research-article
Assessing website password practices – Unchanged after fifteen years?
Abstract

Passwords continue to occupy an interesting position in cyber security, being both widely used and widely criticised at the same time. In many cases the criticism is levelled at users, who are routinely judged to be at fault for making ...

research-article
On-manifold adversarial attack based on latent space substitute model
Abstract

Modern image classification networks endure adversarial attacks that deliberately alter the input image by adding small, often imperceptible, perturbations to mislead the network’s classification result. From a perspective of manifold ...

research-article
Deep learning based cross architecture internet of things malware detection and classification
Abstract

The number of publicly exposed Internet of Things (IoT) devices has been increasing, as more number of these devices connected to the internet with default settings. The devices accessed with default credentials are getting compromised ...

research-article
CLICKA: Collecting and leveraging identity cues with keystroke dynamics
Abstract

The way in which IT systems are usually secured is through the use of username and password pairs. However, these credentials are all too easily lost, stolen or compromised. The use of behavioural biometrics can be used to supplement ...

research-article
KPointer: Keep the code pointers on the stack point to the right code
Abstract

Affected by vulnerabilities, the control data on the stack is easily destroyed, which provides the most convenient conditions for code reuse attacks (CRAs). The operating system (OS) does not impose strict restrictions on the control ...

research-article
A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques
Abstract Context

There are many datasets for training and evaluating models to detect web attacks, labeling each request as normal or attack. Web attack protection tools must provide additional information on the type of attack ...

research-article
MMM-RF: A novel high accuracy multinomial mixture model for network intrusion detection systems
Abstract

The rise of malicious practice in network traffic is one of the most noticeable issues in network security. This practice is negatively impacting the productivity of various organizations and end-users. In this paper, a novel approach ...

research-article
Reducing false positives in bank anti-fraud systems based on rule induction in distributed tree-based models
Abstract

Fraud detection in bank payments transactions suffers from a high number of false positives. To deal with this problem, we introduce a rules generation framework for a fraud-detection system – an automatic rules generation using ...

research-article
Tamp-X: Attacking explainable natural language classifiers through tampered activations
Highlights

  • Tampering the activations of explainable natural language classifiers can fool state-of-the-art XAI methods

Abstract

While the technique of Deep Neural Networks (DNNs) has been instrumental in achieving state-of-the-art results for various Natural Language Processing (NLP) tasks, recent works have shown that the decisions made by DNNs cannot always ...

research-article
An internet of secure and private things: A service-oriented architecture
Abstract

Low-cost networked IoT devices are fast becoming commonplace. From implanted medical devices to motion-activated surveillance cameras and from driverless smart cars to voice-operated home management systems, IoT devices continue to ...

research-article
Authenticating tier-two body area network devices through user-specific signal propagation characteristics
Abstract

Wireless body area network (WBAN) plays a vital role in patient health monitoring due to its ability to measure private physiological data of patients via low-power sensor devices and send them to medical experts through wireless ...

research-article
Malware‐SMELL: A zero‐shot learning strategy for detecting zero‐day vulnerabilities
Abstract

One of the most relevant security problems is inferring whether a program has malicious intent (malware software). Even though Antivirus is one of the most popular approaches for malware detection, new types of malware are released at ...

research-article
HAGDetector: Heterogeneous DGA domain name detection model
Abstract

The botnet relies on the Command and Control (C&C) channels to conduct its malicious activities remotely. The Domain Generation Algorithm (DGA) is often used by botnets to hide their Command and Control (C&C) server and evade take-down ...

research-article
The cybersecurity risk estimation engine: A tool for possibility based risk analysis
Abstract

Despite dramatic changes in the constellation of cybersecurity risks, the basic approach to risk calculation has been anchored to probability theory. The probability approach is widely known and conceptually simple. But it is ...

research-article
Threat classification model for security information event management focusing on model efficiency
Abstract

As various types of network threats have increased recently, manual threat response by security analysts has become a limitation. To compensate for this, the importance of security information event management (SIEM), a response system ...

research-article
Concept drift and cross-device behavior: Challenges and implications for effective android malware detection
Abstract

The large body of Android malware research has demonstrated that machine learning methods can provide high performance for detecting Android malware. However, the vast majority of studies underestimate the evolving nature of the threat ...

research-article
IFAttn: Binary code similarity analysis based on interpretable features with attention
Abstract

Binary code similarity analysis (BCSA BCSA: Binary Code Similarity Analysis. ) is meaningful in various software security applications, including vulnerability discovery, ...

research-article
Remote Registration and Group Authentication of IoT Devices in 5G Cellular Network
Abstract

The Fifth Generation (5G) of cellular mobile network, due its speed and flexibility, will be a preferred communication technology for future deployment of the Internet of Things (IoT). However, with the rapid growth in the number of ...

research-article
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
Abstract

Cybersecurity is a broadly defined concept comprising security for many different types of elements. Dealing with cybersecurity is a multidimensional problem, and the damage generated by cyberattacks can be very diverse. Reports about ...

research-article
EvilModel 2.0: Bringing Neural Network Models into Malware Attacks
Abstract

Security issues have gradually emerged with the continuous development of artificial intelligence (AI). Earlier work verified the possibility of converting neural network models into stegomalware, embedding malware into a model with ...

research-article
Improving transferability of adversarial examples by saliency distribution and data augmentation
Highlights

  • We propose a novel attack method to improve the transferability of targeted attacks.

Abstract

Although deep neural networks (DNNs) have advanced performance in many application scenarios, they are vulnerable to the attacks of adversarial examples that are crafted by adding imperceptible perturbations. Most of the existing ...

research-article
AdIoTack: Quantifying and refining resilience of decision tree ensemble inference models against adversarial volumetric attacks on IoT networks
Abstract

Machine Learning-based techniques have shown success in cyber intelligence. However, they are increasingly becoming targets of sophisticated data-driven adversarial attacks resulting in misprediction, eroding their ability to detect ...

research-article
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis
Abstract

Traditional malware detection methods based on static traffic characteristics and machine learning are hard to cope with the increasing number of APT malware variants. In order to alleviate this problem, this paper proposes a deep-...

research-article
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity
Abstract

Self-Sovereign Identity (SSI) empowers users to govern their digital identity and personal data. This approach has changed the identity paradigm where users become the central governor of their identity; hence the rapid growth of the ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.