In recent years, cybersecurity has been strengthened through the adoption of processes, mechanisms and rapid sources of indicators of compromise in critical areas. Among the most latent challenges are the detection, classification and eradication of malware and Denial of Service Cyber-Attacks (DoS). The literature has presented different ways to obtain and evaluate malware- and DoS-cyber-attack-related instances, either from a technical point of view or by offering ready-to-use datasets. However, acquiring fresh, up-to-date samples requires an arduous process of exploration, sandbox configuration and mass storage, which may ultimately result in an unbalanced or under-represented set. Synthetic sample generation has shown that the cost assoc...
This project aims to present the functionality and accuracy of five different machine learning algor...
The presence of attacks in day-to-day traffic flow in connected networks is considerably less compar...
A denial of service (DoS) attack is one of the dangerous threats to networks that Internet resources...
In this paper, we are going to verify the possibility to create a ransomware simulation that will us...
Modern commercial antivirus systems increasingly rely on machine learning to keep up with the rampan...
Ransomware is malware that hijacks a victim's data using encryption and demands a ransom in exchange...
Cavazos, JohnThe malware threat landscape is constantly evolving, with upwards of one million new va...
Many security problems in software systems are because of vulnerabilities caused by improper configu...
Cyber security is used to protect and safeguard computers and various networks from ill-intended dig...
Deep learning methods are being increasingly widely used in static malware detection field because t...
Malware has been one of the key concerns for Information Technology security researchers for decades...
Many types of malicious software are controlled from an attacker’s command and control (C2) servers....
Security of real-world cyber systems has drawn a lot of attention in recent years, especially when m...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
Despite the widespread deployment of malware detection software, in many situations it is difficult ...
This project aims to present the functionality and accuracy of five different machine learning algor...
The presence of attacks in day-to-day traffic flow in connected networks is considerably less compar...
A denial of service (DoS) attack is one of the dangerous threats to networks that Internet resources...
In this paper, we are going to verify the possibility to create a ransomware simulation that will us...
Modern commercial antivirus systems increasingly rely on machine learning to keep up with the rampan...
Ransomware is malware that hijacks a victim's data using encryption and demands a ransom in exchange...
Cavazos, JohnThe malware threat landscape is constantly evolving, with upwards of one million new va...
Many security problems in software systems are because of vulnerabilities caused by improper configu...
Cyber security is used to protect and safeguard computers and various networks from ill-intended dig...
Deep learning methods are being increasingly widely used in static malware detection field because t...
Malware has been one of the key concerns for Information Technology security researchers for decades...
Many types of malicious software are controlled from an attacker’s command and control (C2) servers....
Security of real-world cyber systems has drawn a lot of attention in recent years, especially when m...
We present the first dataset that aims to serve as a benchmark to validate the resilience of botnet ...
Despite the widespread deployment of malware detection software, in many situations it is difficult ...
This project aims to present the functionality and accuracy of five different machine learning algor...
The presence of attacks in day-to-day traffic flow in connected networks is considerably less compar...
A denial of service (DoS) attack is one of the dangerous threats to networks that Internet resources...