supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)(Project Nos.RS-2024-00438551,30%,2022-11220701,30%,2021-0-01816,30%);the National Research Foundation of Korea(NRF)grant funded by the Korean Government(Project No.RS2023-00208460,10%).
The proliferation of Internet of Things(IoT)devices has established edge computing as a critical paradigm for real-time data analysis and low-latency processing.Nevertheless,the distributed nature of edge computing pr...
The growing complexity of cyber threats requires innovative machine learning techniques,and image-based malware classification opens up new possibilities.Meanwhile,existing research has largely overlooked the impact o...
The growing threat of malware,particularly in the Portable Executable(PE)format,demands more effective methods for detection and classification.Machine learning-based approaches exhibit their potential but often negle...
In the realm of cybersecurity,the detection and analysis of obfuscated malware remain a critical challenge,especially in the context of memory dumps.This research paper presents a novel machine learning-based framewor...
Small and Medium-sized Enterprises (SMEs) are considered the backbone of global economy, but they often face cyberthreats which threaten their financial stability and operational continuity. This work aims to offer a ...
supported by the National Natural Science Foundation of China under Grant U20A20156;supported by the Foundation of National Key Laboratory of Radar Signal Processing under Grant JKW202303.
Zero-day malware refers to a previously unknown or newly discovered type of malware.While most existing studies rely on large malware sample sets,their performance is unknown when dealing with a limited number of samp...
supported by a sub-project of the National Key Research and Development Program of the Ministry of Science and Technology,with grant number 2022YFB4501700
With the increasing prevalence of Android software,protecting it against malicious threats has become a critical concern.Traditional malware detection methods,tailored for static environments,often fail to adapt to ev...
supported in part by NSF Grants#2113945 and#2200538 and a generous financial and technical support from Palo Alto Networks,Inc.
In today's interconnected world,network traffic is replete with adversarial attacks.As technology evolves,these attacks are also becoming increasingly sophisticated,making them even harder to detect.Fortunately,artifi...
With the ever-increasing continuous adoption of Industrial Internet of Things(IoT)technologies,security concerns have grown exponentially,especially regarding securing critical infrastructures.This is primarily due to...
Despite only being around for a few years, mobile devices have steadily risen to become the most extensively used computer devices. Given the number of people who rely on smartphones, which can install third-party app...