Results 1 to 10 of about 81,305 (190)
Adversarial Malware Generation Method Based on Genetic Algorithm [PDF]
In recent years,with the development of Internet technology,malware has become an important method of network attack.To defend against malware attacks,deep learning techniques can be applied to malware detection.However,due to the limitations of deep ...
LI Kun, GUO Wei, ZHANG Fan, DU Jiayu, YANG Meiyue
doaj +1 more source
Attention-Based Cross-Modal CNN Using Non-Disassembled Files for Malware Classification
The role of malware classification is crucial in addressing the explosive increase in malware variants. By classifying malware instances into malware families, malware analysts can apply appropriate techniques and tools to handle malware variants in each
Jeongwoo Kim +2 more
doaj +1 more source
Malware Detection on Local Network based on Honeypot and Yara
The malware threats have never subsided, even the trend shows an increase and varies along with the development of hardware and software technology. End user may not realize if their machine is compromised by malware.
Nur Rohman Rosyid +4 more
doaj +1 more source
Malware has plagued the internet and computing systems for decades. The war against malware has always been an arms race. Researchers and industry have constantly improved detection and prevention methodologies against increasingly more evasive malware ...
Siwon Huh +4 more
doaj +1 more source
Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies
The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society.
Ashawa Moses, Sarah Morris
doaj +1 more source
Study on Malware Classification Based on N-Gram Static Analysis Technology [PDF]
In order to solve the problem of low accuracy of malware classification,this paper proposes a research on malware classification based on N-Gram static analysis technology.Firstly,the N-Gram method is used to extract the byte sequence of length 2 from ...
ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen
doaj +1 more source
SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems
An intensive care unit (ICU) is dedicated to caring for patients whose medical condition places them at high risk of mortality or serious morbidity. ICU medical devices (ICUMDs) are used to closely monitor, stabilize, and treat ICU patients who are often
Carmel Eliash, Isaac Lazar, Nir Nissim
doaj +1 more source
On the Effectiveness of Perturbations in Generating Evasive Malware Variants
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin +3 more
doaj +1 more source
MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images
In recent years, cyber-attacks against individuals, businesses, and organizations have increased. Cyber criminals are always looking for effective vectors to deliver malware to victims in order to launch an attack.
Aviad Cohen, Nir Nissim, Yuval Elovici
doaj +1 more source
Today, cardiac implantable electronic devices (CIEDs), such as pacemakers and implantable cardioverter defibrillators (ICDs), play an increasingly important role in healthcare ecosystems as patient life support devices.
Matan Kintzlinger +7 more
doaj +1 more source

