Results 61 to 70 of about 25,310,274 (105)
The Malware Analysis Body of Knowledge (MABOK) [PDF]
The ability to forensically analyse malicious software (malware) is becoming an increasingly important discipline in the field of Digital Forensics.
Brand, Murray William, Valli, Craig
core +1 more source
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim +4 more
wiley +1 more source
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) [PDF]
This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection.
Mazlan, Nurul Hidayah
core +1 more source
VPNFilter Malware Analysis on Cyber Threat in Smart Home Network
Recently, the development of smart home technologies has played a crucial role in enhancing several real-life smart applications. They help improve the quality of life through systems designed to enhance convenience, comfort, entertainment, health of the
Jose Costa Sapalo Sicato +3 more
semanticscholar +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A Comprehensive Analysis of Explainable AI for Malware Hunting
ACM Computing SurveysIn the past decade, the number of malware variants has increased rapidly. Many researchers have proposed to detect malware using intelligent techniques, such as Machine Learning (ML) and Deep Learning (DL), which have high accuracy and precision.
Philippe Charland +2 more
exaly +2 more sources
A Survey on malware analysis and mitigation techniques
Computer Science Review, 2019In recent days, malwares are advanced, sophisticatedly engineered to attack the target. Most of such advanced malwares are highly persistent and capable of escaping from the security systems.
Sibi Chakkaravarthy S
exaly +2 more sources
Network Security, 2023
Objective. Currently, the main method of attack on organizations is malware. The problem of strengthening protection against this type of attack remains relevant and requires new approaches.
K. Kendall, Charles F. McMillan
semanticscholar +1 more source
Objective. Currently, the main method of attack on organizations is malware. The problem of strengthening protection against this type of attack remains relevant and requires new approaches.
K. Kendall, Charles F. McMillan
semanticscholar +1 more source
Obfuscation-Resilient Android Malware Analysis Based on Complementary Features
IEEE Transactions on Information Forensics and Security, 2023Existing Android malware detection methods are usually hard to simultaneously resist various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an effective means to circumvent Android malware analysis.
Cuiying Gao +6 more
semanticscholar +1 more source
A Survey of Malware Analysis Using Community Detection Algorithms
ACM Computing Surveys, 2023In recent years, we have witnessed an overwhelming and fast proliferation of different types of malware targeting organizations and individuals, which considerably increased the time required to detect malware.
Abdelouahab Amira +3 more
semanticscholar +1 more source
Android malware analysis and detection: A systematic review
Expert Syst. J. Knowl. Eng., 2023Android malware has been emerged as a significant threat, which includes exposure of confidential information, misrepresentation of facts and execution of applications without the knowledge of the users.
Anuradha Dahiya +2 more
semanticscholar +1 more source

