SMRD: a novel cyber warfare modeling framework for Social Engineering, Malware, Ransomware, and Distributed Denial-of-Service based on a system of nonlinear differential equations
Cyber warfare has emerged as a critical aspect of modern conflict, as state and non-state actors increasingly leverage cyber capabilities to achieve strategic objectives. The rapidly evolving cyber threat landscape demands robust and adaptive approaches to protect against advanced cyberattacks and m...
| Main Authors: | Bouke, Mohamed Aly, Abdullah, Azizol |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
SABA Publishing
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/119970/ http://psasir.upm.edu.my/id/eprint/119970/1/119970.pdf |
Similar Items
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
Cyber warfare: a new type of combat
by: Hossain, Ishtiaq
Published: (2014)
by: Hossain, Ishtiaq
Published: (2014)
Cyber warfare impact to national security - Malaysia experiences
by: Azian, Ibrahim, et al.
Published: (2019)
by: Azian, Ibrahim, et al.
Published: (2019)
Ransomware: Stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021)
Ransomware: stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2022)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2022)
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
IoTContact: a strategy for predicting contagious IoT nodes in mitigating ransomware attacks
by: Ibrahim, Mohammed, et al.
Published: (2021)
by: Ibrahim, Mohammed, et al.
Published: (2021)
A Short Review for Ransomware: Pros and Cons
by: Shakir, Hasan Awni, et al.
Published: (2018)
by: Shakir, Hasan Awni, et al.
Published: (2018)
Nonlinear integral equations and its relations with differential equations
by: Eshkuvatov, Zainidin K.
Published: (2010)
by: Eshkuvatov, Zainidin K.
Published: (2010)
Russia and "hybrid warfare"
by: Renz, Bettina
Published: (2016)
by: Renz, Bettina
Published: (2016)
Cyberspace: the warfare domain
by: Songip, Ahmad Rahman, et al.
Published: (2013)
by: Songip, Ahmad Rahman, et al.
Published: (2013)
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
The iterative solutions of nonlinear fractional differential equations
by: Zhang, Xinguang, et al.
Published: (2013)
by: Zhang, Xinguang, et al.
Published: (2013)
Distributed Denial of Service detection using hybrid machine learning technique
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Malware classification framework for dynamic analysis using Information Theory
by: Moshiri, Ehsan, et al.
Published: (2017)
by: Moshiri, Ehsan, et al.
Published: (2017)
Report of job done on preventing ransomware virus attack to PC
by: Mustafa, mohd mizam, et al.
Published: (2017)
by: Mustafa, mohd mizam, et al.
Published: (2017)
An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
Transformation methods in the study of nonlinear partial differential equations
by: Sophocleous, Christodoulos
Published: (1991)
by: Sophocleous, Christodoulos
Published: (1991)
Application of differential transform method on nonlinear integro-differential equations with proportional delay
by: Abazari, Reza, et al.
Published: (2014)
by: Abazari, Reza, et al.
Published: (2014)
The rise of ransomware: a review of attacks, detection techniques, and future challenges
by: Kamil, Samar, et al.
Published: (2022)
by: Kamil, Samar, et al.
Published: (2022)
Dynamic ransomware detection for windows platform using machine learning classifiers
by: Jaya, M. Izham, et al.
Published: (2022)
by: Jaya, M. Izham, et al.
Published: (2022)
Germ Warfare and the Zero-Sum Game
by: Abd Razak, Dzulkifli
Published: (1995)
by: Abd Razak, Dzulkifli
Published: (1995)
Homotopy-perturbation method for solving linear and nonlinear differential equation
by: Chowdhury, Md. Sazzad Hossien
Published: (2015)
by: Chowdhury, Md. Sazzad Hossien
Published: (2015)
Assessment of decomposition method for linear and nonlinear
fractional differential equations
by: Abdulaziz, O., et al.
Published: (2007)
by: Abdulaziz, O., et al.
Published: (2007)
New oscillation conditions for nonlinear second order differential equations
by: Abdalla Salhin, Ambarka, et al.
Published: (2019)
by: Abdalla Salhin, Ambarka, et al.
Published: (2019)
Nonlinear partial differential equations model related to ethanol production
by: Ahmad Izul Fakhruddin, Azimi, et al.
Published: (2019)
by: Ahmad Izul Fakhruddin, Azimi, et al.
Published: (2019)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
Comparing linear and nonlinear differential equations of differential transformation method by other numerical methods
by: Che Hussin, Che Haziqah, et al.
Published: (2013)
by: Che Hussin, Che Haziqah, et al.
Published: (2013)
Eigenvalue Problem of Nonlinear Semipositone Higher Order Fractional Differential Equations
by: Wu, J., et al.
Published: (2012)
by: Wu, J., et al.
Published: (2012)
Existence of solutions to
various classes of nonlinear
elliptic differential equations
and their applications
by: Wei, Na
Published: (2020)
by: Wei, Na
Published: (2020)
Dynamical Properties of Solutions for Various Types of Nonlinear Partial Differential Equations
by: Li, Rui
Published: (2019)
by: Li, Rui
Published: (2019)
Solving Nonlinear Algebraic Problem Using Newton Homotopy Differential Equation
by: Hasan, Talib Hashim, et al.
Published: (2011)
by: Hasan, Talib Hashim, et al.
Published: (2011)
Instability to nonlinear vector differential equations of fourth order with constant delay
by: Tunc, Cemil
Published: (2013)
by: Tunc, Cemil
Published: (2013)
On the instability of solutions of nonlinear delay differential equations of fourth and fifth order
by: Tunc, Cemil
Published: (2011)
by: Tunc, Cemil
Published: (2011)
Nonlinear the first kind Fredholm integro-differential first-order equation with degenerate kernel and nonlinear maxima
by: Yuldashev, T. K., et al.
Published: (2022)
by: Yuldashev, T. K., et al.
Published: (2022)
Flooding Distributed Denial of Service Attacks-A Review
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
by: Wan Mohd Ghazali, Khadijah, et al.
Published: (2011)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
Permission extraction framework for android malware detection
by: Ghasempour, Ali
Published: (2019)
by: Ghasempour, Ali
Published: (2019)
Similar Items
-
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013) -
Cyber warfare: a new type of combat
by: Hossain, Ishtiaq
Published: (2014) -
Cyber warfare impact to national security - Malaysia experiences
by: Azian, Ibrahim, et al.
Published: (2019) -
Ransomware: Stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2021) -
Ransomware: stages, detection and evasion
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2022)