Cyber Threat Intelligence and Analytics: Cyber attack triage is among most complicated and time-consuming tasks of security analysts. These triage activities are mainly focused on analyzing malware, exploit-kits and other attack payloads for timely identification of attack payloads (i.e. the malware). AI has a lot to offer to cyber threat triage and may significantly reduce the required time and resources to respond to an incident. Cyber Science Lab built a number of unique datasets for AI-Aided cyber threat triage as lack of suitable security datasets for AI tasks is among most important barriers in advancing research in this field. CSL has contributed to several researches for AI-aided Malware Analysis, Ransomware Analysis, AI-aided threat attribution and Cyber Threat Analytics.

Fuzzy pattern tree for edge malware detection and categorization in IoT
Fuzzy pattern tree for edge malware detection and categorization in IoT Abstract: The surging pace of Internet of Things (IoT)
Read more.
An opcode‐based technique for polymorphic Internet of Things malware detection
An opcode‐based technique for polymorphic Internet of Things malware detection Abstract: The increasing popularity of Internet of Things (IoT) devices
Read more.
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer Abstract: Ransomware, a malware designed to encrypt data
Read more.
Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as
Analysis of APT Actors Targeting IoT and Big Data Systems: Shell_Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe as
Read more.
A Bibliometric Analysis of Botnet Detection Techniques
A Bibliometric Analysis of Botnet Detection Techniques Abstract: Botnets are rising as a platform for many unlawful cyber activities such
Read more.
A Cyber Kill Chain Based Analysis of Remote Access Trojans
A Cyber Kill Chain Based Analysis of Remote Access Trojans Abstract: Computer networks and industrial systems are always under cyber
Read more.
Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin
Analysis and Triage of Advanced Hacking Groups Targeting Western Countries Critical National Infrastructure: APT28, RED October, and Regin Abstract: Many
Read more.
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting Abstract: Internet of Things (IoT) devices
Read more.
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning Abstract: Internet of Things (IoT) in military
Read more.
BoTShark: A Deep Learning Approach for Botnet Traffic Detection
BoTShark: A Deep Learning Approach for Botnet Traffic Detection Abstract: While botnets have been extensively studied, bot malware is constantly
Read more.
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies Abstract: Various researchers have
Read more.
Cyber Threat Intelligence: Challenges and Opportunities
Cyber Threat Intelligence: Challenges and Opportunities Abstract: The ever increasing number of cyber attacks requires the cyber security and forensic
Read more.