Articles with "malicious behavior" as a keyword



Photo by possessedphotography from unsplash

Network attack prediction method based on threat intelligence for IoT

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-7005-2

Abstract: The Social Internet of Things (SIoT) is a combination of the Internet of Things (IoT) and social networks, which enables better service discovery and improves the user experience. The threat posed by the malicious behavior… read more here.

Keywords: threat intelligence; malicious behavior; method; threat ... See more keywords
Photo by stephen16 from unsplash

Open Source Intelligence for Malicious Behavior Discovery and Interpretation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3119008

Abstract: Cyber threats are one of the most pressing issues in the digital age. There has been a consensus on deploying a proactive defense to effectively detect and respond to adversary threats. The key to success… read more here.

Keywords: malicious behavior; open source; source; behavior discovery ... See more keywords
Photo by dawson2406 from unsplash

TagSeq: Malicious behavior discovery using dynamic analysis

Sign Up to like & get
recommendations!
Published in 2022 at "PLoS ONE"

DOI: 10.1371/journal.pone.0263644

Abstract: In recent years, studies on malware analysis have noticeably increased in the cybersecurity community. Most recent studies concentrate on malware classification and detection or malicious patterns identification, but as to malware activity, it still relies… read more here.

Keywords: tagseq malicious; discovery using; analysis; behavior discovery ... See more keywords