Results 21 to 30 of about 6,970 (211)
Malware Detection Using Binary Visualization and Neural Networks [PDF]
Any programme or code that is damaging to our systems or networks is known as Malware or malicious software. Malware attempts to infiltrate, damage, or destroy our gadgets such as computers, networks, tablets, and so on. Malware may also grant partial or
Jonnala Yamini Devi +4 more
doaj +1 more source
Effective and Reliable Malware Group Classification for a Massive Malware Environment
Most of the cyber-attacks are caused by malware, and damage from them has escalated from cyber space to home appliances and infrastructure, thus affecting the daily living of the people. As such, anticipative analysis and countermeasures for malware have
Taejin Lee, Jin Kwak
doaj +1 more source
Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies.
Nor Zakiah Gorment +3 more
doaj +1 more source
Technique for IoT malware detection based on control flow graph analysis
The Internet of Things (IoT) refers to the millions of devices around the world that are connected to the Internet. Insecure IoT devices designed without proper security features are the targets of many Internet threats.
Kira Bobrovnikova +4 more
doaj +1 more source
Objective. Currently, the main method of attack on organizations is malware. The problem of strengthening protection against this type of attack remains relevant and requires new approaches. The main task is to analyze malware to assess threats and timely detection and take action.Method.
D. A. Elizarov, A. V. Katkov
openaire +2 more sources
Study on Malware Classification Based on N-Gram Static Analysis Technology [PDF]
In order to solve the problem of low accuracy of malware classification,this paper proposes a research on malware classification based on N-Gram static analysis technology.Firstly,the N-Gram method is used to extract the byte sequence of length 2 from ...
ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen
doaj +1 more source
API Malware Analysis : Exploring Detection And Forensics Strategies For Secure Software Development
API Malware Analysis and Forensics is a key field of research in cybersecurity. It is critical to have strong defenses in place to detect and prevent malware attacks. APIs, since they can have disastrous consequences.
Husam Alalloush, Wasim Ali
doaj
DroidPortrait: Android Malware Portrait Construction Based on Multidimensional Behavior Analysis
Recently, security incidents such as sensitive data leakage and video/audio hardware control caused by Android malware have raised severe security issues that threaten Android users, so thus behavior analysis and detection research researches of ...
Xin Su +5 more
doaj +1 more source
An Automated Framework for Runtime Analysis of Malicious Executables on Linux
One way of testing a malware detection tool is to expose it to a large number of diverse malware samples and verify its detection accuracy. During these tests, the host system must not be harmed by malware and yet be able to analyze its harmful behavior.
I. Vurdelja +3 more
doaj +1 more source
This article explores the application of anomaly detection models from network flow data using multi-layer perceptron autoencoding neural networks, for the purpose of self-supervised detection of novel network intrusion events and malware classes over unrestrained internet connections.
Thomas Alan Woolman, Philip Lunsford
openaire +1 more source

