Results 41 to 50 of about 134,256 (265)

Coevolution of Mobile Malware and Anti-Malware

open access: yesIEEE Transactions on Information Forensics and Security, 2018
Mobile malware is one of today's greatest threats in computer security. Furthermore, new mobile malware is emerging daily that introduces new security risks. However, while existing security solutions generally protect mobile devices against known risks, they are vulnerable to as yet unknown risks.
Sevil Sen, Emre Aydogan, Ahmet I. Aysan
openaire   +2 more sources

Malware Detection Issues, Challenges, and Future Directions: A Survey

open access: yesApplied Sciences, 2022
The evolution of recent malicious software with the rising use of digital services has increased the probability of corrupting data, stealing information, or other cybercrimes by malware attacks.
Faitour. A. Aboaoja   +5 more
semanticscholar   +1 more source

A Study of the Relationship Between Antivirus Regressions and Label Changes [PDF]

open access: yes, 2013
AntiVirus (AV) products use multiple components to detect malware. A component which is found in virtually all AVs is the signature-based detection engine: this component assigns a particular signature label to a malware that the AV detects.
Cukier, M.   +4 more
core   +1 more source

Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions

open access: yesIEEE Access, 2023
Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies.
Nor Zakiah Gorment   +3 more
semanticscholar   +1 more source

Obfuscation-based malware update: A comparison of manual and automated methods [PDF]

open access: yes, 2017
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C.   +4 more
core   +2 more sources

FastText-Based Local Feature Visualization Algorithm for Merged Image-Based Malware Classification Framework for Cyber Security and Cyber Defense

open access: yesMathematics, 2020
The importance of cybersecurity has recently been increasing. A malware coder writes malware into normal executable files. A computer is more likely to be infected by malware when users have easy access to various executables.
Sejun Jang, Shuyu Li, Yunsick Sung
doaj   +1 more source

An Adaptive Behavioral-Based Incremental Batch Learning Malware Variants Detection Model Using Concept Drift Detection and Sequential Deep Learning

open access: yesIEEE Access, 2021
Malware variants are the major emerging threats that face cybersecurity due to the potential damage to computer systems. Many solutions have been proposed for detecting malware variants.
Abdulbasit A. Darem   +5 more
doaj   +1 more source

Android Malware Characterization using Metadata and Machine Learning Techniques [PDF]

open access: yes, 2017
Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to ...
Guzmán, Antonio   +3 more
core   +2 more sources

Machine-Learning Classifiers for Malware Detection Using Data Features

open access: yesJournal of ICT Research and Applications, 2021
The spread of ransomware has risen exponentially over the past decade, causing huge financial damage to multiple organizations. Various anti-ransomware firms have suggested methods for preventing malware threats.
Saleh Abdulaziz Habtor   +1 more
doaj   +1 more source

Research on the Construction of Malware Variant Datasets and Their Detection Method

open access: yesApplied Sciences, 2022
Malware detection is of great significance for maintaining the security of information systems. Malware obfuscation techniques and malware variants are increasingly emerging, but their samples and API (application programming interface) sequences are ...
Faming Lu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy