2022
DOI: 10.3390/s22155883
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation

Abstract: Currently, Android apps are easily targeted by malicious network traffic because of their constant network access. These threats have the potential to steal vital information and disrupt the commerce, social system, and banking markets. In this paper, we present a malware detection system based on word2vec-based transfer learning and multi-model image representation. The proposed method combines the textual and texture features of network traffic to leverage the advantages of both types. Initially, the transfe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 42 publications
(51 reference statements)
0
2
0
Order By: Relevance
“…We modify the shape of X to yield X r ∈ R S 2 × HW S 2 ×C . Subsequently, the feature vectors undergo a linear transformation to yield three matrices, namely Q, K, and V. The mathematical formulas for these calculations are provided in Equations ( 9)- (11).…”
Section: Biformer Attention Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…We modify the shape of X to yield X r ∈ R S 2 × HW S 2 ×C . Subsequently, the feature vectors undergo a linear transformation to yield three matrices, namely Q, K, and V. The mathematical formulas for these calculations are provided in Equations ( 9)- (11).…”
Section: Biformer Attention Mechanismmentioning
confidence: 99%
“…Nevertheless, this approach encounters substantial operational expenses due to the expansive expanse of forested landscape under consideration. Conventional methods of early forest fire detection predominantly rely on smoke and temperature-sensitive sensors, often in a combined configuration [10][11][12]. These sensors are engineered to detect airborne smoke particulates and swift escalations in ambient temperature, thereby facilitating fire detection.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, numerous scholars have made significant advancements in deeplearning-based object detection methods. Farhan Ullah et al [19] proposed a cyber threat detection system that combines migration learning and multi-model image characterization in a hybrid approach. Du et al [20] introduced BV-YOLOv5S, a modification of YOLOv5S, to achieve real-time defect detection in road pits.…”
Section: Related Workmentioning
confidence: 99%
“…The CNN network is To achieve this, the merged features (ACGs, texture) are fed into CNN. CNN model performs better with diverse data types, including textual, texture, and media features [27,28]. For this purpose, we employ 1-D convolutional layers, pooling layers, dropout layers, and a fully connected layer.…”
Section: Deep Features Selectionmentioning
confidence: 99%