4.6 Review

Automated System-Level Malware Detection Using Machine Learning: A Comprehensive Review

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Provably Secure Lattice-Based Self-Certified Signature Scheme

Qiang Yang et al.

Summary: This paper proposes a self-certified signature scheme over lattice, which reduces the complexity of certificate management and enhances security compared to traditional public key signature schemes.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Artificial Intelligence

RADE: resource-efficient supervised anomaly detection using decision tree-based ensemble methods

Shay Vargaftik et al.

Summary: RADE is a new resource-efficient anomaly detection framework that enhances standard decision-tree based ensemble classifiers to perform well in a resource-constrained setting. It trains a small model to correctly classify the majority of queries and expert models for harder cases with subsets of training data, significantly improving memory footprint, training-time, and classification time.

MACHINE LEARNING (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Secure Offloading of Intrusion Detection Systems from VMs with Intel SGX

Tomoharu Nakano et al.

Summary: This paper presents SGmonitor, a system for securely executing IDS offloaded from VMs inside clouds using Intel SGX technology. SGmonitor ensures confidentiality and integrity by running IDS in SGX enclaves, and provides secure VMI for memory and storage through encryption and integrity checking.

2021 IEEE 14TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2021) (2021)

Proceedings Paper Computer Science, Theory & Methods

Anomaly Detection on EtherCAT Based Water Level Control Automation

Kevser Ovaz Akpinar et al.

2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK) (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Fence GAN: Towards Better Anomaly Detection

Phuc Cuong Ngo et al.

2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019) (2019)

Article Computer Science, Artificial Intelligence

Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic

Anderson Hiroshi Hamamoto et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Adversarially Learned Anomaly Detection

Houssam Zenati et al.

2018 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM) (2018)

Article Computer Science, Artificial Intelligence

OCPAD: One class Naive Bayes classifier for payload based anomaly detection

Mayank Swarnkar et al.

EXPERT SYSTEMS WITH APPLICATIONS (2016)

Article Chemistry, Physical

Firefly Algorithm for Structural Search

Guillermo Avendano-Franco et al.

JOURNAL OF CHEMICAL THEORY AND COMPUTATION (2016)

Article Engineering, Electrical & Electronic

Mobile Agent-Based Cross-Layer Anomaly Detection in Smart Home Sensor Networks Using Fuzzy Logic

Muhammad Usman et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2015)

Article Telecommunications

A Digital Evidence Fusion Method in Network Forensics Systems with Dempster-Shafer Theory

Tian Zhihong et al.

CHINA COMMUNICATIONS (2014)

Proceedings Paper Computer Science, Theory & Methods

Network Anomaly Detection Using Random Forests and Entropy of Traffic Features

Dong Yao et al.

2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012) (2012)

Article Computer Science, Information Systems

Swarm intelligence in intrusion detection: A survey

C. Kolias et al.

COMPUTERS & SECURITY (2011)

Article Computer Science, Artificial Intelligence

Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers

Ming-Yang Su

EXPERT SYSTEMS WITH APPLICATIONS (2011)

Article Computer Science, Hardware & Architecture

A novel unsupervised classification approach for network anomaly detection by k-Means clustering and ID3 decision tree learning methods

Yasser Yasami et al.

JOURNAL OF SUPERCOMPUTING (2010)

Article Computer Science, Theory & Methods

QoS-based dissemination of content in Grids

Agostino Forestiero et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2008)

Article Computer Science, Information Systems

Efficient anomaly detection by modeling privilege flows using hidden Markov model

SB Cho et al.

COMPUTERS & SECURITY (2003)