Results 41 to 50 of about 97,198 (223)
Survey of Machine Learning Techniques for Malware Analysis [PDF]
Coping with malware is getting more and more challenging, given their relentless growth in complexity and volume. One of the most common approaches in literature is using machine learning techniques, to automatically learn models and patterns behind ...
Aniello, Leonardo +2 more
core +2 more sources
Cloud computing is integral to modern IT infrastructure, with Linux-based virtual machines (VMs) comprising 95% of public cloud environments. This widespread use makes Linux VMs a prime target for cyberattacks, particularly advanced malware designed for ...
Tom Landman, Nir Nissim
doaj +1 more source
On the Reverse Engineering of the Citadel Botnet [PDF]
Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the
A Rahimian +4 more
core +3 more sources
Malware-on-the-Brain: Illuminating Malware Byte Codes With Images for Malware Classification
Malware is a piece of software that was written with the intent of doing harm to data, devices, or people. Since a number of new malware variants can be generated by reusing codes, malware attacks can be easily launched and thus become common in recent years, incurring huge losses in businesses, governments, financial institutes, health providers, etc.
Fangtian Zhong +5 more
openaire +2 more sources
Reverse Engineering untuk Analisis Malware Remote Access Trojan
Para hacker menggunakan malware Remote Access Trojan untuk merusak sistem kemudian mencuri data para korbannya. Diperlukan analisis mendalam mengenai malware baru-baru ini karena malware dapat berkamuflase seperti sistem tidak dicurigai.
Tesa Pajar Setia +2 more
doaj +1 more source
Malware family classification is an age old problem that many Anti-Virus (AV) companies have tackled. There are two common techniques used for classification, signature based and behavior based.
Alrawi, Omar, Mohaisen, Abedelaziz
core +1 more source
Combating the OS-level malware is a very challenging problem as this type of malware can compromise the operating system, obtaining the kernel privilege and subverting almost all the existing anti-malware tools.
Niusen Chen, Bo Chen
doaj +1 more source
FAM: Featuring Android Malware for Deep Learning-Based Familial Analysis
To handle relentlessly emerging Android malware, deep learning has been widely adopted in the research community. Prior work proposed deep learning-based approaches that use different features of malware, and reported a high accuracy in malware detection,
Younghoon Ban +4 more
doaj +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
The ever-increasing growth of online services and smart connectivity of devices have posed the threat of malware to computer system, android-based smart phones, Internet of Things (IoT)-based systems.
Santosh K. Smmarwar +2 more
doaj +1 more source

