Results 11 to 20 of about 31,501 (227)

MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware

open access: yes2023 IEEE International Conference on Intelligence and Security Informatics (ISI), 2023
Malware is one of the most dangerous and costly cyber threats to national security and a crucial factor in modern cyber-space. However, the adoption of machine learning (ML) based solutions against malware threats has been relatively slow. Shortcomings in the existing ML approaches are likely contributing to this problem.
Eren, Maksim E.   +4 more
openaire   +2 more sources

Binary and Multi-Class Malware Threads Classification

open access: yesApplied Sciences, 2022
The security of a computer system can be harmed by specific applications, such as malware. Malware comprises unwanted, dangerous enemies that aim to compromise the security and generate significant loss.
Ismail Taha Ahmed   +3 more
doaj   +1 more source

Robust Malware Family Classification Using Effective Features and Classifiers

open access: yesApplied Sciences, 2022
Malware development has significantly increased recently, posing a serious security risk to both consumers and businesses. Malware developers continually find new ways to circumvent security research’s ongoing efforts to guard against malware attacks ...
Baraa Tareq Hammad   +4 more
doaj   +1 more source

Identifying the Author Group of Malwares through Graph Embedding and Human-in-the-Loop Classification

open access: yesApplied Sciences, 2021
Malware are developed for various types of malicious attacks, e.g., to gain access to a user’s private information or control of the computer system. The identification and classification of malware has been extensively studied in academic societies and ...
Dong-Kyu Chae   +4 more
doaj   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Detection of Exceptional Malware Variants Using Deep Boosted Feature Spaces and Machine Learning

open access: yesApplied Sciences, 2021
Malware is a key component of cyber-crime, and its analysis is the first line of defence against cyber-attack. This study proposes two new malware classification frameworks: Deep Feature Space-based Malware classification (DFS-MC) and Deep Boosted ...
Muhammad Asam   +8 more
doaj   +1 more source

DroidDetectMW: A Hybrid Intelligent Model for Android Malware Detection

open access: yesApplied Sciences, 2023
Malicious apps specifically aimed at the Android platform have increased in tandem with the proliferation of mobile devices. Malware is now so carefully written that it is difficult to detect.
Fatma Taher   +4 more
doaj   +1 more source

A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks [PDF]

open access: yes, 2020
The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would ...
Alaeiyan, M   +4 more
core   +2 more sources

Klasifikasi Malware Family menggunakan Metode k-Nearest Neighbor (k-NN) [PDF]

open access: yes, 2021
Smartphones based on Android OS have the most users today because they are comfortable to use and offer a variety of features. As a result, many malware developers have made Android OS their main target. Every year, new types of malware families emerge
Akbi, Denar Regata   +2 more
core   +1 more source

On Deceiving Malware Classification with Section Injection

open access: yesMachine Learning and Knowledge Extraction, 2023
We investigate how to modify executable files to deceive malware classification systems. This work’s main contribution is a methodology to inject bytes across a malware file randomly and use it both as an attack to decrease classification accuracy but ...
Adeilson Antonio da Silva   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy