Results 11 to 20 of about 6,970 (211)
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Malware Authorship Attribution Model using Runtime Modules based on Automated Analysis
Malware authorship attribution is a research field that identifies the author of malware by extracting and analyzing features that relate the authors from the source code or binary code of malware.
Sangwoo Lee, Jungwon Cho
doaj +1 more source
Malware, also known as malicious software affects the user’s computer system or mobile devices by exploiting the system’s vulnerabilities. It is a major threat to the security of the computer systems. Some of the types of malwares that are most commonly used are viruses, trojans, worms, etc.
Ujaliben Kalpesh Bavishi +1 more
openaire +2 more sources
Hypervisor-assisted dynamic malware analysis
Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools.
Roee S. Leon +3 more
doaj +1 more source
DroidDetectMW: A Hybrid Intelligent Model for Android Malware Detection
Malicious apps specifically aimed at the Android platform have increased in tandem with the proliferation of mobile devices. Malware is now so carefully written that it is difficult to detect.
Fatma Taher +4 more
doaj +1 more source
A Systematic Literature Review of Android Malware Detection Using Static Analysis
Android malware has been in an increasing trend in recent years due to the pervasiveness of Android operating system. Android malware is installed and run on the smartphones without explicitly prompting the users or without the user's permission, and it ...
Ya Pan +3 more
doaj +1 more source
MalView: Interactive Visual Analytics for Comprehending Malware Behavior
Malicious applications are usually comprehended through two major techniques, namely static and dynamic analyses. Through static analysis, a given malicious program is parsed, and some representative artifacts (e.g., control-flow graphs) are produced ...
Huyen N. Nguyen +5 more
doaj +1 more source
Due to the widespread usage of Android smartphones in the present era, Android malware has become a grave security concern. The research community relies on publicly available datasets to keep pace with evolving malware.
Husnain Rafiq +4 more
doaj +1 more source
Malware Detection Using Memory Analysis Data in Big Data Environment
Malware is a significant threat that has grown with the spread of technology. This makes detecting malware a critical issue. Static and dynamic methods are widely used in the detection of malware. However, traditional static and dynamic malware detection
Murat Dener, Gökçe Ok, Abdullah Orman
doaj +1 more source
A static analysis approach for Android permission-based malware detection systems.
The evolution of malware is causing mobile devices to crash with increasing frequency. Therefore, adequate security evaluations that detect Android malware are crucial.
Juliza Mohamad Arif +5 more
doaj +1 more source

