Results 11 to 20 of about 134,256 (265)

Analisis Ekstraksi Fitur dan Klasifikasi Data Keluarga Malware Menggunakan Convolutional Neural Network [PDF]

open access: yes, 2023
Malware merupakan perangkat lunak berbahaya yang dapat mengganggu kinerja dari suatu sistem, dan telah menjadi salah satu cyber threat yang perlu mendapat perhatian khusus.
Akbi, Denar Regata, Suhardi, Diding
core   +1 more source

A Comprehensive Analysis of Today’s Malware and Its Distribution Network: Common Adversary Strategies and Implications

open access: yesIEEE Access, 2022
Malware has plagued the internet and computing systems for decades. The war against malware has always been an arms race. Researchers and industry have constantly improved detection and prevention methodologies against increasingly more evasive malware ...
Siwon Huh   +4 more
doaj   +1 more source

Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies

open access: yesJournal of Information Security and Cybercrimes Research, 2021
The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society.
Ashawa Moses, Sarah Morris
doaj   +1 more source

MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware

open access: yes2023 IEEE International Conference on Intelligence and Security Informatics (ISI), 2023
Malware is one of the most dangerous and costly cyber threats to national security and a crucial factor in modern cyber-space. However, the adoption of machine learning (ML) based solutions against malware threats has been relatively slow. Shortcomings in the existing ML approaches are likely contributing to this problem.
Eren, Maksim E.   +4 more
openaire   +2 more sources

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Study on Malware Classification Based on N-Gram Static Analysis Technology [PDF]

open access: yesJisuanji kexue, 2022
In order to solve the problem of low accuracy of malware classification,this paper proposes a research on malware classification based on N-Gram static analysis technology.Firstly,the N-Gram method is used to extract the byte sequence of length 2 from ...
ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen
doaj   +1 more source

Automated Machine Learning for Deep Learning based Malware Detection [PDF]

open access: yesComputers & security, 2023
Deep learning (DL) has proven to be effective in detecting sophisticated malware that is constantly evolving. Even though deep learning has alleviated the feature engineering problem, finding the most optimal DL model, in terms of neural architecture ...
Austin R. Brown   +2 more
semanticscholar   +1 more source

SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems

open access: yesIEEE Access, 2020
An intensive care unit (ICU) is dedicated to caring for patients whose medical condition places them at high risk of mortality or serious morbidity. ICU medical devices (ICUMDs) are used to closely monitor, stabilize, and treat ICU patients who are often
Carmel Eliash, Isaac Lazar, Nir Nissim
doaj   +1 more source

Artificial Intelligence-Based Malware Detection, Analysis, and Mitigation

open access: yesSymmetry, 2023
Malware, a lethal weapon of cyber attackers, is becoming increasingly sophisticated, with rapid deployment and self-propagation. In addition, modern malware is one of the most devastating forms of cybercrime, as it can avoid detection, make digital ...
Amir Djenna   +3 more
semanticscholar   +1 more source

MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images

open access: yesIEEE Access, 2020
In recent years, cyber-attacks against individuals, businesses, and organizations have increased. Cyber criminals are always looking for effective vectors to deliver malware to victims in order to launch an attack.
Aviad Cohen, Nir Nissim, Yuval Elovici
doaj   +1 more source

Home - About - Disclaimer - Privacy