Recent studies have shown the negatives impact of malware attacks are increasing. To prevent malware attack in more proactive way, predictions of such attacks are needed. However, the quality and the accuracy of these predictions are determined by the applied techniques. In this paper, we report our findings on selecting and implementing such techniques in predicting malware attacks. For the selection process, we conducted a systematic review and searched over 5 major databases. 89 articles on malware predictions were finally included and prediction techniques are classified. As part of our on-going development project known as Integrated Cyber Evidence (ICE), we evaluated the selected technique using actual data of malware attacks. The res...
Malware is one of the major security threats in a computer and network environment. Modem malware em...
The report presents the final year project to design and develop an application that performs malwar...
The current evolution of the cyber-threat ecosystem shows that no system can be considered invulnera...
Malware is a threat to information security and poses a security threat to harm networks or computer...
In recent years, cyberattacks have increased rapidly in huge volumes and diversity. Despite the exis...
Predictive analysis allows next-generation cyber defense that is more proactive than current approac...
This paper provides a survey of prediction, and forecasting methods used in cyber security. Four mai...
Malware has become a more widespread problem alongside the rapid growth of technology. Malware is an...
New types of malware with unique characteristics are being created daily in legion. This exponential...
Malware is a variety of forms of hostile or intrusive software that being thrown around online. Data...
Abstract Having the ability to forecast cyberattacks before they happen will unquestionably change t...
Cyber-security has emerged as one of the most pressing issues for society with actors trying to use ...
Predicting cyberattacks using machine learning has become imperative since cyberattacks have increas...
Although cybersecurity research has demonstrated that many of the recent cyberattacks targeting real...
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterpris...
Malware is one of the major security threats in a computer and network environment. Modem malware em...
The report presents the final year project to design and develop an application that performs malwar...
The current evolution of the cyber-threat ecosystem shows that no system can be considered invulnera...
Malware is a threat to information security and poses a security threat to harm networks or computer...
In recent years, cyberattacks have increased rapidly in huge volumes and diversity. Despite the exis...
Predictive analysis allows next-generation cyber defense that is more proactive than current approac...
This paper provides a survey of prediction, and forecasting methods used in cyber security. Four mai...
Malware has become a more widespread problem alongside the rapid growth of technology. Malware is an...
New types of malware with unique characteristics are being created daily in legion. This exponential...
Malware is a variety of forms of hostile or intrusive software that being thrown around online. Data...
Abstract Having the ability to forecast cyberattacks before they happen will unquestionably change t...
Cyber-security has emerged as one of the most pressing issues for society with actors trying to use ...
Predicting cyberattacks using machine learning has become imperative since cyberattacks have increas...
Although cybersecurity research has demonstrated that many of the recent cyberattacks targeting real...
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterpris...
Malware is one of the major security threats in a computer and network environment. Modem malware em...
The report presents the final year project to design and develop an application that performs malwar...
The current evolution of the cyber-threat ecosystem shows that no system can be considered invulnera...