Results 131 to 140 of about 27,012 (180)
HabitSense: A Privacy-Aware, AI-Enhanced Multimodal Wearable Platform for mHealth Applications. [PDF]
Fernandes GJ +11 more
europepmc +1 more source
Mitigating semantic label divergence in federated learning: Obfuscated encoding and alert filtering for security monitoring. [PDF]
Lee Y, Im J, Kim J, Yoon M.
europepmc +1 more source
A hybrid super learner ensemble for phishing detection on mobile devices. [PDF]
Rao RS, Kondaiah C, Pais AR, Lee B.
europepmc +1 more source
Attribution classification method of APT malware based on multi-feature fusion. [PDF]
Zhang J, Liu S, Liu Z.
europepmc +1 more source
MaSS-Droid: Android Malware Detection Framework Using Multi-Layer Feature Screening and Stacking Integration. [PDF]
Zhang Z, Han Q, Shi Z.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Code obfuscation techniques for metamorphic viruses
Journal in Computer Virology, 2008This paper deals with metamorphic viruses. More precisely, it examines the use of advanced code obfuscation techniques with respect to metamorphic viruses. Our objective is to evaluate the difficulty of a reliable static detection of viruses that use such obfuscation techniques. Here we extend Spinellis’ result (IEEE Trans. Inform.
Ludovic MĂ©
exaly +3 more sources
A taxonomy of self-modifying code for obfuscation
Computers and Security, 2011Self-modifying code is frequently used as an additional layer of complexity when obfuscating code. Although it does not provide a provable level of obfuscation, it is generally assumed to make attacks more expensive. This paper attempts to quantify the cost of attacking self-modified code by defining a taxonomy for it and systematically categorising an
Bart Preneel
exaly +2 more sources
Data Hiding Using Code Obfuscation
Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021Digital transformation of many companies and government administrations, now accelerated by the pandemic, provides cybercriminals an increased opportunity of incorporating various types of information hiding techniques into the malicious software and by that perform different types of attacks.
Pawel Rajba, Wojciech Mazurczyk
openaire +1 more source

