Ausgabe 2/2023
Inhalt (10 Artikel)
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware
Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi, Daisuke Miyamoto
Application of the SAMA methodology to Ryuk malware
Ander Granado Masid, Javier Bermejo Higuera, Juan-Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo
XAI for intrusion detection system: comparing explanations based on global and local scope
Swetha Hariharan, R. R. Rejimol Robinson, Rendhir R. Prasad, Ciza Thomas, N. Balakrishnan
RETRACTED ARTICLE: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM
Mundlamuri Venkata Rao, Divya Midhunchakkaravarthy, Sujatha Dandu
RETRACTED ARTICLE: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation
Feilu Hang, Linjiang Xie, Zhenhong Zhang, Wei Guo, Hanruo Li
IFMD: image fusion for malware detection
Hashem Hashemi, Mohammad Ebrahim Samie, Ali Hamzeh
A comprehensive review of the security flaws of hashing algorithms
Alireza Sadeghi-Nasab, Vahid Rafe
Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks
Meysam Ghahramani, Reza Javidan
Improving binary diffing speed and accuracy using community detection and locality-sensitive hashing: an empirical study
Chariton Karamitas, Athanasios Kehagias