Results 141 to 150 of about 2,609 (164)
Some of the next articles are maybe not open access.

EntropyVis: Malware classification

2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2017
Malware writers often develop malware with automated measures, so the number of malware has increased dramatically. Automated measures tend to repeatedly use significant modules, which form the basis for identifying malware variants and discriminating malware families.
Zhuojun Ren, Guang Chen
openaire   +1 more source

Android malware classification method

Proceedings of the 2013 Research in Adaptive and Convergent Systems, 2013
The number of Android malware is increasing with the growth of Android, so there needs to have a method to classify malware families. There are many classification methods proposed so far, but most of them are based on permission information such as the number of requested permissions and critical permissions.
Byeongho Kang   +3 more
openaire   +1 more source

Clustering for malware classification

Journal of Computer Virology and Hacking Techniques, 2016
In this research, we apply clustering techniques to the malware classification problem. We compute clusters using the well-known K-means and Expectation Maximization algorithms, with the underlying scores based on Hidden Markov Models. We compare the results obtained from these two clustering approaches and we carefully consider the interplay between ...
Corrado Aaron Visaggio   +4 more
openaire   +2 more sources

Transfer learning for malware multi-classification

Proceedings of the 23rd International Database Applications & Engineering Symposium on - IDEAS '19, 2019
In this paper, we build on top of the MalConv neural networks learning architecture which was initially designed for malware/benign classification. We evaluate the transfer learning of MalConv for malware multi-class classification by extending its contribution in several directions: (1) We assess MalConv performance on a multi-classification problem ...
Kadri, Mohamad Al   +2 more
openaire   +1 more source

Metamorphic Malware Classification

2014
Metamorphic malware tend to change its code structure, every time it infects a new host machine. This makes classification and subsequent detection of the malware very difficult. Unlike other viruses, metamorphic malware uses code obfuscation techniques on the body of the malware and that way the malware structure does not exhibit a common signature ...
openaire   +1 more source

Clustering and Malware Classification

2019
In the present time, where people maintain a close relationship with smartphones, it is easier for cybercriminals to gain user’s personal data by installing malware without the user’s knowledge or authorization. In such a situation where the user’s data and privacy are always at threat, it is necessary to build a resilient system so as to curb such ...
Tony Thomas   +2 more
openaire   +1 more source

Quantum Classification of Malware

2014
The D-Wave architecture is a unique approach to computing which utilizes quantum annealing to solve discrete optimization problems. Applications for D-Wave machines include binary classification, complex protein-folding models, and heuristics for intractable problems such as the Traveling Salesman Problem.
openaire   +1 more source

A Malware Classification Method Based on Generic Malware Information

2015
Since attackers easily have been making malware using dedicated malware generation tools, the number of malware is increasing rapidly. However, it is hard to analyze all malwares because of rise in high-volume of malwares. For this reason, many researchers have proposed the malware classification methods for classifying new and well-known types of ...
Jiyeon Choi   +3 more
openaire   +1 more source

QuEST for malware type-classification

SPIE Proceedings, 2015
Current cyber-related security and safety risks are unprecedented, due in no small part to information overload and skilled cyber-analyst shortages. Advances in decision support and Situation Awareness (SA) tools are required to support analysts in risk mitigation.
Sandra L. Vaughan   +6 more
openaire   +1 more source

Malware Payload Dissection and Classification

2020
A poisonous snake bites a person. What is the procedure to treat a snakebite victim? You take the patient to the hospital. First, there must be an assurance that the victim has been bitten by a snake and not by any other animal. Next, the patient is given an antidote, but not any antidote.
Abhijit Mohanta, Anoop Saldanha
openaire   +1 more source

Home - About - Disclaimer - Privacy