Results 11 to 20 of about 25,310,274 (105)

Survey of Machine Learning Techniques for Malware Analysis [PDF]

open access: yesComputers & security, 2018
Coping with malware is getting more and more challenging, given their relentless growth in complexity and volume. One of the most common approaches in literature is using machine learning techniques, to automatically learn models and patterns behind ...
Aniello, Leonardo   +2 more
core   +4 more sources

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial [PDF]

open access: yesarXiv.org, 2018
Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections.
Andrii Shalaginov   +8 more
core   +2 more sources

Nebula: Self-Attention for Dynamic Malware Analysis [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2023
Dynamic analysis enables detecting Windows malware by executing programs in a controlled environment and logging their actions. Previous work has proposed training machine learning models, i.e., convolutional and long short-term memory networks, on ...
Dmitrijs Trizna   +3 more
semanticscholar   +1 more source

A Survey on Adversarial Attacks for Malware Analysis [PDF]

open access: yesIEEE Access, 2021
Machine learning-based malware analysis approaches are widely researched and deployed in critical infrastructures for detecting and classifying evasive and growing malware threats.
Kshitiz Aryal   +2 more
semanticscholar   +1 more source

Malware Analysis and Detection Using Machine Learning Algorithms

open access: yesSymmetry, 2022
One of the most significant issues facing internet users nowadays is malware. Polymorphic malware is a new type of malicious software that is more adaptable than previous generations of viruses.
M. Akhtar, Tao Feng
semanticscholar   +1 more source

Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response

open access: yesItalian National Conference on Sensors, 2023
In this study, the methodology of cyber-resilience in small and medium-sized organizations (SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware analysis, detection and response using open-source solutions is proposed for ...
Lucian Florin Ilca, P. Ogrutan, T. Balan
semanticscholar   +1 more source

IoT Malware Analysis Using Federated Learning: A Comprehensive Survey

open access: yesIEEE Access, 2023
The Internet of Things (IoT) has paved the way to a highly connected society where all things are interconnected and exchanging information has become more accessible through the internet.
Madumitha Venkatasubramanian   +2 more
semanticscholar   +1 more source

Malware Analysis in IoT & Android Systems with Defensive Mechanism

open access: yesElectronics, 2022
The Internet of Things (IoT) and the Android operating system have made cutting-edge technology accessible to the general public. These are affordable, easy-to-use, and open-source technology.
Chandra Shekhar Yadav   +8 more
semanticscholar   +1 more source

Tree-Based Classifier Ensembles for PE Malware Analysis: A Performance Revisit

open access: yesAlgorithms, 2022
Given their escalating number and variety, combating malware is becoming increasingly strenuous. Machine learning techniques are often used in the literature to automatically discover the models and patterns behind such challenges and create solutions ...
M. Louk, Bayu Adhi Tama
semanticscholar   +1 more source

A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks [PDF]

open access: yes, 2020
The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would ...
Alaeiyan, M   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy