2022
DOI: 10.1007/s10207-022-00631-5
|View full text |Cite
|
Sign up to set email alerts
|

A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…The accuracy comparison, as shown in Figure 2 between the proposed UA-DES-DBN model and the related models (VGG16-PSO [48], DBN-IDS [49], and DBN [50]) across various input layer sizes reveals that the UA-DES-DBN model consistently outperforms the other models, at almost all input sizes. The results show that as the input layer size increases from 5 to 20, the UA-DES-DBN model's accuracy improves significantly, reaching a peak accuracy of 0.986 at an input size of 20.…”
Section: Resultsmentioning
confidence: 96%
“…The accuracy comparison, as shown in Figure 2 between the proposed UA-DES-DBN model and the related models (VGG16-PSO [48], DBN-IDS [49], and DBN [50]) across various input layer sizes reveals that the UA-DES-DBN model consistently outperforms the other models, at almost all input sizes. The results show that as the input layer size increases from 5 to 20, the UA-DES-DBN model's accuracy improves significantly, reaching a peak accuracy of 0.986 at an input size of 20.…”
Section: Resultsmentioning
confidence: 96%
“…Deep learning models may struggle to adapt to rapidly changing environments, leading to potential obsolescence [129][130][131][132][133][134][135][136]. Developing dynamic models capable of continuous learning from new data and adapting to evolving threat landscapes is a solution to this problem.…”
Section: Open Challengesmentioning
confidence: 99%
“…Use of malicious codes (malware) to log into a network or system without authorization. (Sharma et al, 2023;Wang et al, 2022) Network exploitation…”
Section: Malware Distributionmentioning
confidence: 99%