This project uses deep learning techniques to detect malware by analyzing file characteristics, byte sequences, and behavioral patterns. It employs Convolutional Neural Networks (CNNs) for image-based ...
1 Department of General Surgery, Shangyu People’s Hospital of Shaoxing, Shaoxing, Zhejiang, China 2 Center of Gallbladder Disease, Shanghai East Hospital, Institute of Gallstone Disease, School of ...
ABSTRACT: The research aim is to develop an intelligent agent for cybersecurity systems capable of detecting abnormal user behavior using deep learning methods and ensuring interpretability of ...
This repository contains the source code, scripts, and supplementary materials for the paper: "A New Hybrid Model for Improving Outlier Detection Using Combined Autoencoder and Variational Autoencoder ...
Researchers at Google’s Threat Intelligence Group (GTIG) have discovered that hackers are creating malware that can harness the power of large language models (LLMs) to rewrite itself on the fly. An ...
Deep learning has emerged as a transformative tool for the automated detection and classification of seizure events from intracranial EEG (iEEG) recordings. In this review, we synthesize recent ...
A new Android malware family, Herodotus, uses random delay injection in its input routines to mimic human behavior on mobile devices and evade timing-based detection by security software. Herodotus, ...
ABSTRACT: This work contributes to the development of intelligent data-driven approaches to improve intrusion management in smart IoT environments. The proposed model combines a hybrid ...
Abstract: Malware continues to pose a serious threat to cybersecurity, especially with the rise of unknown or zero day attacks that bypass the traditional antivirus tools. This study proposes a hybrid ...