Results 1 to 10 of about 81,305 (190)

Adversarial Malware Generation Method Based on Genetic Algorithm [PDF]

open access: yesJisuanji kexue, 2023
In recent years,with the development of Internet technology,malware has become an important method of network attack.To defend against malware attacks,deep learning techniques can be applied to malware detection.However,due to the limitations of deep ...
LI Kun, GUO Wei, ZHANG Fan, DU Jiayu, YANG Meiyue
doaj   +1 more source

Attention-Based Cross-Modal CNN Using Non-Disassembled Files for Malware Classification

open access: yesIEEE Access, 2023
The role of malware classification is crucial in addressing the explosive increase in malware variants. By classifying malware instances into malware families, malware analysts can apply appropriate techniques and tools to handle malware variants in each
Jeongwoo Kim   +2 more
doaj   +1 more source

Malware Detection on Local Network based on Honeypot and Yara

open access: yesSistemasi: Jurnal Sistem Informasi, 2023
The malware threats have never subsided, even the trend shows an increase and varies along with the development of hardware and software technology. End user may not realize if their machine is compromised by malware.
Nur Rohman Rosyid   +4 more
doaj   +1 more source

A Comprehensive Analysis of Today’s Malware and Its Distribution Network: Common Adversary Strategies and Implications

open access: yesIEEE Access, 2022
Malware has plagued the internet and computing systems for decades. The war against malware has always been an arms race. Researchers and industry have constantly improved detection and prevention methodologies against increasingly more evasive malware ...
Siwon Huh   +4 more
doaj   +1 more source

Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies

open access: yesJournal of Information Security and Cybercrimes Research, 2021
The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society.
Ashawa Moses, Sarah Morris
doaj   +1 more source

Study on Malware Classification Based on N-Gram Static Analysis Technology [PDF]

open access: yesJisuanji kexue, 2022
In order to solve the problem of low accuracy of malware classification,this paper proposes a research on malware classification based on N-Gram static analysis technology.Firstly,the N-Gram method is used to extract the byte sequence of length 2 from ...
ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen
doaj   +1 more source

SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems

open access: yesIEEE Access, 2020
An intensive care unit (ICU) is dedicated to caring for patients whose medical condition places them at high risk of mortality or serious morbidity. ICU medical devices (ICUMDs) are used to closely monitor, stabilize, and treat ICU patients who are often
Carmel Eliash, Isaac Lazar, Nir Nissim
doaj   +1 more source

On the Effectiveness of Perturbations in Generating Evasive Malware Variants

open access: yesIEEE Access, 2023
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin   +3 more
doaj   +1 more source

MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images

open access: yesIEEE Access, 2020
In recent years, cyber-attacks against individuals, businesses, and organizations have increased. Cyber criminals are always looking for effective vectors to deliver malware to victims in order to launch an attack.
Aviad Cohen, Nir Nissim, Yuval Elovici
doaj   +1 more source

CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices

open access: yesIEEE Access, 2020
Today, cardiac implantable electronic devices (CIEDs), such as pacemakers and implantable cardioverter defibrillators (ICDs), play an increasingly important role in healthcare ecosystems as patient life support devices.
Matan Kintzlinger   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy