Results 21 to 30 of about 134,256 (265)

On the Effectiveness of Perturbations in Generating Evasive Malware Variants

open access: yesIEEE Access, 2023
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin   +3 more
doaj   +1 more source

A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks [PDF]

open access: yes, 2020
The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would ...
Alaeiyan, M   +4 more
core   +2 more sources

CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices

open access: yesIEEE Access, 2020
Today, cardiac implantable electronic devices (CIEDs), such as pacemakers and implantable cardioverter defibrillators (ICDs), play an increasingly important role in healthcare ecosystems as patient life support devices.
Matan Kintzlinger   +7 more
doaj   +1 more source

Binary and Multi-Class Malware Threads Classification

open access: yesApplied Sciences, 2022
The security of a computer system can be harmed by specific applications, such as malware. Malware comprises unwanted, dangerous enemies that aim to compromise the security and generate significant loss.
Ismail Taha Ahmed   +3 more
doaj   +1 more source

An Attacker’s Dream? Exploring the Capabilities of ChatGPT for Developing Malware

open access: yesCSET @ USENIX Security Symposium, 2023
We investigate the potential for abuse of recent AI advances by developing seven malware programs and two attack tools using ChatGPT, OpenAI Playground’s "text-davinci-003" model, and Auto-GPT—an open-source AI agent capable of generating automated ...
Yin Minn Pa Pa   +5 more
semanticscholar   +1 more source

Robust Malware Family Classification Using Effective Features and Classifiers

open access: yesApplied Sciences, 2022
Malware development has significantly increased recently, posing a serious security risk to both consumers and businesses. Malware developers continually find new ways to circumvent security research’s ongoing efforts to guard against malware attacks ...
Baraa Tareq Hammad   +4 more
doaj   +1 more source

Intensive Malware Detection Approach based on Data Mining

open access: yesJournal of Applied Engineering and Technological Science, 2023
Malicious software, sometimes known as malware, is software designed to harm a computer, network, or any of the connected resources. Without the user's knowledge, malware can spread throughout their computer system. Malware is typically disseminated via
Israa Ezzat Salem, Karim Hashim Al-Saedi
doaj   +1 more source

The rise of machine learning for detection and classification of malware: Research developments, trends and challenges

open access: yesJournal of Network and Computer Applications, 2020
The struggle between security analysts and malware developers is a never-ending battle with the complexity of malware changing as quickly as innovation grows.
Daniel Gibert   +2 more
semanticscholar   +1 more source

Malware Detection with Artificial Intelligence: A Systematic Literature Review

open access: yesACM Computing Surveys, 2023
In this survey, we review the key developments in the field of malware detection using AI and analyze core challenges. We systematically survey state-of-the-art methods across five critical aspects of building an accurate and robust AI-powered malware ...
Matthew Gaber   +2 more
semanticscholar   +1 more source

SoK: Cryptojacking Malware [PDF]

open access: yes2021 IEEE European Symposium on Security and Privacy (EuroS&P), 2021
Emerging blockchain and cryptocurrency-based technologies are redefining the way we conduct business in cyberspace. Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through ...
Tekiner, Ege   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy