Results 61 to 70 of about 25,310,274 (105)

The Malware Analysis Body of Knowledge (MABOK) [PDF]

open access: yes, 2008
The ability to forensically analyse malicious software (malware) is becoming an increasingly important discipline in the field of Digital Forensics.
Brand, Murray William, Valli, Craig
core   +1 more source

AI‐Powered Anomaly Detection for Secure Internet of Things (IoT): Optimising XGBoost and Deep Learning With Bayesian Optimisation

open access: yesCAAI Transactions on Intelligence Technology, Volume 11, Issue 2, Page 447-463, April 2026.
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim   +4 more
wiley   +1 more source

Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) [PDF]

open access: yes, 2019
This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection.
Mazlan, Nurul Hidayah
core   +1 more source

VPNFilter Malware Analysis on Cyber Threat in Smart Home Network

open access: yesApplied Sciences, 2019
Recently, the development of smart home technologies has played a crucial role in enhancing several real-life smart applications. They help improve the quality of life through systems designed to enhance convenience, comfort, entertainment, health of the
Jose Costa Sapalo Sicato   +3 more
semanticscholar   +1 more source
Some of the next articles are maybe not open access.

Related searches:

A Comprehensive Analysis of Explainable AI for Malware Hunting

ACM Computing Surveys
In the past decade, the number of malware variants has increased rapidly. Many researchers have proposed to detect malware using intelligent techniques, such as Machine Learning (ML) and Deep Learning (DL), which have high accuracy and precision.
Philippe Charland   +2 more
exaly   +2 more sources

A Survey on malware analysis and mitigation techniques

Computer Science Review, 2019
In recent days, malwares are advanced, sophisticatedly engineered to attack the target. Most of such advanced malwares are highly persistent and capable of escaping from the security systems.
Sibi Chakkaravarthy S
exaly   +2 more sources

Practical Malware Analysis

Network Security, 2023
Objective. Currently, the main method of attack on organizations is malware. The problem of strengthening protection against this type of attack remains relevant and requires new approaches.
K. Kendall, Charles F. McMillan
semanticscholar   +1 more source

Obfuscation-Resilient Android Malware Analysis Based on Complementary Features

IEEE Transactions on Information Forensics and Security, 2023
Existing Android malware detection methods are usually hard to simultaneously resist various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an effective means to circumvent Android malware analysis.
Cuiying Gao   +6 more
semanticscholar   +1 more source

A Survey of Malware Analysis Using Community Detection Algorithms

ACM Computing Surveys, 2023
In recent years, we have witnessed an overwhelming and fast proliferation of different types of malware targeting organizations and individuals, which considerably increased the time required to detect malware.
Abdelouahab Amira   +3 more
semanticscholar   +1 more source

Android malware analysis and detection: A systematic review

Expert Syst. J. Knowl. Eng., 2023
Android malware has been emerged as a significant threat, which includes exposure of confidential information, misrepresentation of facts and execution of applications without the knowledge of the users.
Anuradha Dahiya   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy