Malware Analysis Using Artificial Intelligence and Deep Learning 2020
DOI: 10.1007/978-3-030-62582-5_7
|View full text |Cite
|
Sign up to set email alerts
|

Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Following the rules and being ethical is important to stop people from using things in the wrong way and causing harm Doukas et.al. [16]. People are worried that AI systems might make existing biases and discrimination worse.…”
Section: Challenges and Limitationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Following the rules and being ethical is important to stop people from using things in the wrong way and causing harm Doukas et.al. [16]. People are worried that AI systems might make existing biases and discrimination worse.…”
Section: Challenges and Limitationsmentioning
confidence: 99%
“…This detailed review will help with future studies and advancements in the area of IoT security Doukas et.al. [16] research looks at how artificial intelligence (AI) can help make systems better at surviving cyber attacks. AI helps systems find and react to threats faster and better without human help.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the rapidly evolving landscape of cybersecurity, malware poses a significant threat to information security, with new variants emerging at an alarming rate [1,2,3,4]. The sophistication of these malicious programs has escalated, particularly in the context of evasive malware, which is designed to thwart detection mechanisms employed by traditional antivirus and cybersecurity measures [5,6,7,8,9,10].…”
Section: Introductionmentioning
confidence: 99%
“…The sophistication of these malicious programs has escalated, particularly in the context of evasive malware, which is designed to thwart detection mechanisms employed by traditional antivirus and cybersecurity measures [5,6,7,8,9,10]. The detection and analysis of such evasive malware remain a constant challenge in the field, necessitating advanced methods and innovative approaches [2,6]. Traditional methods, primarily based on signature detection, are increasingly insufficient as they struggle to cope with the adaptive and polymorphic nature of modern malware, which signals the urgent need for more dynamic and intelligent analysis methods capable of identifying and mitigating these sophisticated threats [6,1].…”
Section: Introductionmentioning
confidence: 99%