Cyber Threat Intelligence and Analytics: Cyber attack triage is among most complicated and time-consuming tasks of security analysts. These triage activities are mainly focused on analyzing malware, exploit-kits and other attack payloads for timely identification of attack payloads (i.e. the malware). AI has a lot to offer to cyber threat triage and may significantly reduce the required time and resources to respond to an incident. Cyber Science Lab built a number of unique datasets for AI-Aided cyber threat triage as lack of suitable security datasets for AI tasks is among most important barriers in advancing research in this field. CSL has contributed to several researches for AI-aided Malware Analysis, Ransomware Analysis, AI-aided threat attribution and Cyber Threat Analytics.

Security aspects of Internet of Things aided smart grids: A bibliometric survey
Security aspects of Internet of Things aided smart grids: A bibliometric survey Abstract: The integration of sensors and communication technology
Read more.
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments Abstract: Current authentication protocols seek to
Read more.
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking Abstract: Security is one of the most challenging issues in
Read more.
Fuzzy pattern tree for edge malware detection and categorization in IoT
Fuzzy pattern tree for edge malware detection and categorization in IoT Abstract: The surging pace of Internet of Things (IoT)
Read more.
An opcode‐based technique for polymorphic Internet of Things malware detection
An opcode‐based technique for polymorphic Internet of Things malware detection Abstract: The increasing popularity of Internet of Things (IoT) devices
Read more.
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer Abstract: Ransomware, a malware designed to encrypt data
Read more.
Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as
Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as
Read more.
A Bibliometric Analysis of Botnet Detection Techniques
A Bibliometric Analysis of Botnet Detection Techniques Abstract: Botnets are rising as a platform for many unlawful cyber activities such
Read more.
A Cyber Kill Chain Based Analysis of Remote Access Trojans
A Cyber Kill Chain Based Analysis of Remote Access Trojans Abstract: Computer networks and industrial systems are always under cyber
Read more.
Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin
Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin Abstract: Many
Read more.
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting Abstract: Internet of Things (IoT) devices
Read more.
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning Abstract: Internet of Things (IoT) in military
Read more.