Accesso libero

Harnessing GPT-2 for Feature Extraction in Malware Detection: A Novel Approach to Cybersecurity

INFORMAZIONI SU QUESTO ARTICOLO

Cita

Al Kinoon, M., Omar, M., Mohaisen, M., & Mohaisen, D. (2021). Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis. Proceedings of the 10th International Conference Computational Data and Social Networks – CSoNet, 171–183. Available at: https://doi.org/10.1007/978-3-030-91434-9_16. Search in Google Scholar

Biggio, B., Corona, I., Maiorca, D., Nelson, B., Šrndić, N., Laskov, P., Giacinto, G., & Roli, F. (2013). Evasion Attacks against Machine Learning at Test Time. Machine Learning and Knowledge Discovery in Databases, European Conference, ECML PKDD, Part III, Vol. 8190, LNCS, 387–402, Springer. Available at: https://doi.org/10.1007/978-3-642-40994-3_25. Search in Google Scholar

Gandotra, E., Bansal, D., & Sofat, S. (2014). Malware Analysis and Classification: A Survey. Journal of Information Security, Vol. 5, Issue 2, 56–64. DOI:10.4236/jis.2014.52006. Search in Google Scholar

Kolosnjaji, B., Zarras, A., Webster, G., & Eckert, C. (2018). Deep Learning for Classification of Malware System Call Sequences. 29th Australasian Joint Conference on Artificial Intelligence, 137–153. DOI:10.1007/978-3-319-50127-7_11. Search in Google Scholar

Mohammed, D., Omar, M., & Nguyen, V. (2018). Wireless Sensor Network Security: Approaches to Detecting and Avoiding Wormhole Attacks. Journal of Research in Business, Economics and Management, Vol. 10, Issue 2, 1860–1864. Available at: http://www.scitecresearch.com/journals/index.php/jrbem/article/view/1413. Search in Google Scholar

Banisakher, M., Omar, M., Hong, S., & Adams, J. (2020). A Human Centric Approach to Data Fusion in Post-Disaster Management. Journal of Business and Management Sciencies, Vol. 8, Issue 1, 12–20. DOI: 10.12691/jbms-8-1-3. Search in Google Scholar

Nguyen, V., Mohammed, D., Omar, M., & Dean, P. (2020). Net Neutrality Around the Globe: A Survey. 3rd International Conference on Information and Computer technologies – ICICT. DOI:10.1109/ICICT50521.2020.00083. Search in Google Scholar

Dawson, M., Omar, M., Abramson, J., & Bessette, D. (2014). Information Security in Diverse Computing Environments, Chapter 9: The Future of National and International Security on the Internet, 149–178. DOI: 10.4018/978-1-4666-6158-5. Search in Google Scholar

Zangana, H.M., & Omar, M. (2020). Threats, Attacks, and Mitigations of Smartphone Security. Academic Journal of Nawroz University, Vol. 9, Issue 4, 324–332. DOI: https://doi.org/10.25007/ajnu.v9n4a989. Search in Google Scholar

Omar, M. (2021a). New insights into database security: An effective and integrated approach for applying access control mechanisms and cryptographic concepts in Microsoft Access environments. MWAIS 2021 Proceedings, 20. Available at: https://aisel.aisnet.org/mwais2021/20. Search in Google Scholar

Omar, M. (2021b). Developing Cybersecurity Education Capabilities at Iraqi Universities. MWAIS 2021 Proceedings, 10. Available at: https://aisel.aisnet.org/mwais2021/10. Search in Google Scholar

Omar, M. (2022). Machine Learning for Cybersecurity: Innovative Deep Learning Solutions, Chapter 1: Application of Machine Learning (ML) to Address Cybersecurity Threats. New York: Springer International Publishing. Search in Google Scholar

Omar, M., Choi, S., Nyang, D., & Mohaisen, D. (2022). Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions. IEEE Access, Computer Science, Linguistics, Vol. 10. DOI: 10.1109/ACCESS.2022.3197769. Search in Google Scholar

Omar, M., Gouveia, L.B., Al-Karaki, J., & Mohammed, D. (2022). Reverse-Engineering Malware. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security, 194–217. DOI:10.4018/978-1-7998-8693-8.ch010. Search in Google Scholar

eISSN:
2247-840X
Lingua:
Inglese