Results 31 to 40 of about 6,970 (211)
Benchmarking Android malware analysis tools
Abstract Today, malware is arguably one of the biggest challenges organizations face from a cybersecurity standpoint, regardless of the types of devices used in the organization. One of the most malware-attacked mobile operating systems today is Android.
Javier Bermejo Higuera +5 more
openaire +1 more source
Packed malware variants detection using deep belief networks [PDF]
Malware is one of the most serious network security threats. To detect unknown variants of malware, many researches have proposed various methods of malware detection based on machine learning in recent years.
Zhang Zhigang +3 more
doaj +1 more source
Homology analysis of malware based on graph
Malware detection and homology analysis has been the hotspot of malware analysis.API call graph of malware can represent the behavior of it.Because of the subgraph isomorphism algorithm has high complexity,the analysis of malware based on the graph ...
Bing-lin ZHAO +4 more
doaj +2 more sources
In this thesis, we delve into the intricate world of malware analysis, shedding light on both static and dynamic approaches, along with the development of an automation tool. Static analysis unveils the inner workings of malware structures without triggering execution, employing REMnux tools to gain crucial insights.
Joakim Kävrestad +2 more
+5 more sources
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System
For the last few years, Android is known to be the most widely used operating system and this rapidly increasing popularity has attracted the malware developer's attention.
Saba Arshad +5 more
doaj +1 more source
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source
Sisyfos: A Modular and Extendable Open Malware Analysis Platform
Sisyfos is a modular and extensible platform for malware analysis; it addresses multiple operating systems, including critical infrastructure ones. Its purpose is to enable the development and evaluation of new tools as well as the evaluation of malware ...
Dimitrios Serpanos +3 more
doaj +1 more source
The scope of this thesis is the study of Malware Analysis on Windows environment in a systematic and detailed manner, based on SAMA methodology. Furthermore, taking under consideration the ENISA guidelines, a laboratory was created, which is modular and capable of isolating the infected VMs, providing them with Internet connection or simulating one ...
openaire +1 more source
Dynamic Analysis for IoT Malware Detection With Convolution Neural Network Model
Internet of Things (IoT) technology provides the basic infrastructure for a hyper connected society where all things are connected and exchange information through the Internet.
Jueun Jeon +2 more
doaj +1 more source

