Results 11 to 20 of about 97,198 (223)
Effective and Reliable Malware Group Classification for a Massive Malware Environment [PDF]
Most of the cyber-attacks are caused by malware, and damage from them has escalated from cyber space to home appliances and infrastructure, thus affecting the daily living of the people. As such, anticipative analysis and countermeasures for malware have
Taejin Lee, Jin Kwak
doaj +2 more sources
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Robust Malware Family Classification Using Effective Features and Classifiers
Malware development has significantly increased recently, posing a serious security risk to both consumers and businesses. Malware developers continually find new ways to circumvent security research’s ongoing efforts to guard against malware attacks ...
Baraa Tareq Hammad +4 more
doaj +1 more source
Study on Malware Classification Based on N-Gram Static Analysis Technology [PDF]
In order to solve the problem of low accuracy of malware classification,this paper proposes a research on malware classification based on N-Gram static analysis technology.Firstly,the N-Gram method is used to extract the byte sequence of length 2 from ...
ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen
doaj +1 more source
Today, cardiac implantable electronic devices (CIEDs), such as pacemakers and implantable cardioverter defibrillators (ICDs), play an increasingly important role in healthcare ecosystems as patient life support devices.
Matan Kintzlinger +7 more
doaj +1 more source
Binary and Multi-Class Malware Threads Classification
The security of a computer system can be harmed by specific applications, such as malware. Malware comprises unwanted, dangerous enemies that aim to compromise the security and generate significant loss.
Ismail Taha Ahmed +3 more
doaj +1 more source
On the Effectiveness of Perturbations in Generating Evasive Malware Variants
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin +3 more
doaj +1 more source
Intensive Malware Detection Approach based on Data Mining
Malicious software, sometimes known as malware, is software designed to harm a computer, network, or any of the connected resources. Without the user's knowledge, malware can spread throughout their computer system. Malware is typically disseminated via
Israa Ezzat Salem, Karim Hashim Al-Saedi
doaj +1 more source
A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks [PDF]
The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would ...
Alaeiyan, M +4 more
core +2 more sources
SoK: Cryptojacking Malware [PDF]
Emerging blockchain and cryptocurrency-based technologies are redefining the way we conduct business in cyberspace. Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through ...
Tekiner, Ege +4 more
openaire +3 more sources

