
Hossain, et. al. (2021). Automatic event categorizer for
siem. In Procs of the 31st Annual Inter. Conf. on Com-
puter Science and Software Engineering, pages 104–
112.
Ijaz, et. al. (2019). Static and dynamic malware analysis us-
ing machine learning. In 16th Inter. bhurban confer-
ence on applied sciences and technology, pages 687–
691. IEEE.
Jaramillo, L. E. (2019). Malware threats analysis and miti-
gation techniques for compromised systems. Jour. of
Information Systems Engineering & Mangt., 4(1).
Jindal, et. al. (2019). Neurlux: dynamic malware analy-
sis without feature engineering. In Procs of the 35th
Annual Computer Security Applications Conference,
pages 444–455.
Kara, I. (2022). Fileless malware threats: Recent advances,
analysis approach through memory forensics and re-
search challenges. Expert Systems with Applications,
page 119133.
Khan, S., Kabanov, I., Hua, Y., and Madnick, S. (2022).
A systematic analysis of the capital one data breach:
Critical lessons learned. ACM Transactions on Pri-
vacy and Security, 26(1):1–29.
Kovács, A. (2022). Ransomware: a comprehensive study
of the exponentially increasing cybersecurity threat.
Insights into Regional Development, 4(2):96–104.
Malwarebytes (2020). 2020 state of malware report.
Markevych, M. and Dawson, M. (2023). A review of
enhancing intrusion detection systems for cybersecu-
rity using artificial intelligence (ai). In Inter. conf.
Knowledge-based Organization, volume 29, pages
30–37.
Mohanta, A. and Saldanha, A. (2020). Malware Anal-
ysis and Detection Engineering: A Comprehensive
Approach to Detect and Analyze Modern Malware.
Springer.
Muniz, et. al. (2015). Security Operations Center: Building,
Operating, and Maintaining Your SOC. Cisco Press.
Murali, et. al. (2020). A malware variant resistant to tradi-
tional analysis techniques. In Inter. Conf. on Emerg-
ing Trends in Information Technology and Engineer-
ing, pages 1–7. IEEE.
Murthy, et. al. (2019). Exploring the api calls for malware
behavior detection using concordance and document
frequency. Inter. Jour. of Engineering and Advanced
Technology, 8(6):4991–4997.
Okolica, J. and Peterson, G. L. (2010). Windows operating
systems agnostic memory analysis. Digital investiga-
tion, 7:S48–S56.
Onwubiko, C. and Ouazzane, K. (2019). Challenges to-
wards building an effective cyber security operations
centre. International Journal On Cyber Situational
Awareness, Vol. 4(No.1):11–39.
Onwubiko, C. and Ouazzane, K. (2020). Soter: A playbook
for cybersecurity incident management. IEEE Trans-
actions on Engineering Management.
Or-Meir, et. al. (2019). Dynamic malware analysis in the
modern era—a state of the art survey. ACM Comput-
ing Surveys, 52(5):1–48.
Ozer, M. et al. (2020). Cloud incident response: Chal-
lenges and opportunities. In Int. Conf. on Computa-
tional Science and Computational Intelligence, pages
49–54. IEEE.
Pachhala, et. al. (2021). A comprehensive survey on iden-
tification of malware types and malware classifica-
tion using machine learning techniques. In 2nd In-
ter. Conf. on Smart Electronics and Communication,
pages 1207–1214. IEEE.
Pavelea, A. and Negrea, P.-C. (2023). A comprehensive
analysis of high-impact cybersecurity incidents: Case
studies and implications.
Pitolli, et. al. (2021). Malfamaware: automatic family
identification and malware classification through on-
line clustering. Inter. Journal of Information Security,
20(3):371–386.
Prähofer, et. al. (2012). Opportunities and challenges of
static code analysis of iec 61131-3 programs. In Procs
of 2012 IEEE 17th Inter. Conf. on Emerging Technolo-
gies & Factory Automation, pages 1–8. IEEE.
Sharma, S. and Bharti, S. (2021). Malware analysis using
ensemble techniques: A machine learning approach.
In 2021 Inter. Conf. on Artificial Intelligence and Ma-
chine Vision, pages 1–5. IEEE.
Shree, et. al. (2022). Memory forensic: Acquisition and
analysis mechanism for operating systems. Materials
Today: Proceedings, 51:254–260.
Sihwail, et. al. (2018). A survey on malware analysis tech-
niques: Static, dynamic, hybrid and memory analysis.
Int. J. Adv. Sci. Eng. Inf. Technol, 8(4-2):1662–1671.
Singh, J. and Singh, J. (2018). Challenge of malware anal-
ysis: malware obfuscation techniques. Inter. Journal
of Information Security Science, 7(3):100–110.
Soni, et. al. (2022). Opcode and api based machine learning
framework for malware classification. In 2nd Inter.
Conf. on Intelligent Technologies, pages 1–7. IEEE.
Souppaya, M., Scarfone, K., et al. (2013). Guide to malware
incident prevention and handling for desktops and lap-
tops. NIST Special Publication, 800:83.
Subedi, et al. (2018). Forensic analysis of ransomware fam-
ilies using static and dynamic analysis. In IEEE Secu-
rity and Privacy Workshops, pages 180–185. IEEE.
Vielberth, et. al. (2020). Security operations center: A
systematic study and open challenges. IEEE Access,
8:227756–227779.
VirusTotal (2022). Writing YARA rules. https://yara.r
eadthedocs.io/en/stable/writingrules.html.
Wang, Z. and Zhu, Y. (2017). A centralized hids frame-
work for private cloud. In 18th IEEE/ACIS Inter. Conf.
on Software Engineering, AI, Networking and Paral-
lel/Distributed Computing, pages 115–120. IEEE.
Wazid, et al. (2019). Iomt malware detection approaches:
analysis and research challenges. IEEE Access,
7:182459–182476.
Wei, et al. (2019). Malware classification system based on
machine learning. In Chinese Control And Decision
Conference, pages 647–652. IEEE.
Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions
169