Results 31 to 40 of about 31,501 (227)

Multiple instance learning for malware classification [PDF]

open access: yesExpert Systems with Applications, 2018
This work addresses classification of unknown binaries executed in sandbox by modeling their interaction with system resources (files, mutexes, registry keys and communication with servers over the network) and error messages provided by the operating system, using vocabulary-based method from the multiple instance learning paradigm.
Stiborek, Jan   +2 more
openaire   +2 more sources

Mobile Malware Classification

open access: yesInternational Journal of Engineering & Technology, 2018
Android malware is growing in such an exponential pace which lead to the need of an efficient malware intrusion  detection technique. The single approach of clustering or classification technique in malware intrusion detection yield to high negative positive alarm rate..
Zolidah Kasiran   +2 more
openaire   +1 more source

Self-Attentive Models for Real-Time Malware Classification

open access: yesIEEE Access, 2022
Malware classification is a critical task in cybersecurity, as it offers insights into the threats that malware poses to the victim device and helps in the design of countermeasures.
Qikai Lu   +3 more
doaj   +1 more source

Function length as a tool for malware classification [PDF]

open access: yes, 2008
The proliferation of malware is a serious threat to computer and information systems throughout the world. Antimalware companies are continually challenged to identify and counter new malware as it is released into the wild.
Batten, L. M., Tian, R., Versteeg, S. C.
core   +1 more source

Discriminant malware distance learning on structuralinformation for automated malware classification [PDF]

open access: yesACM SIGMETRICS Performance Evaluation Review, 2013
In this work, we explore techniques that can automatically classify malware variants into their corresponding families. Our framework extracts structural information from malware programs as attributed function call graphs, further learns discriminant malware distance metrics, finally adopts an ensemble of classifiers for automated malware ...
Deguang Kong, Guanhua Yan
openaire   +1 more source

Detecting obfuscated malware using reduced opcode set and optimised runtime trace [PDF]

open access: yes, 2016
The research presented, investigates the optimal set of operational codes (opcodes) that create a robust indicator of malicious software (malware) and also determines a program’s execution duration for accurate classification of benign and malicious ...
McLaughlin, Kieran   +2 more
core   +1 more source

Machine-Learning-Based Android Malware Family Classification Using Built-In and Custom Permissions

open access: yesApplied Sciences, 2021
Malware family classification is grouping malware samples that have the same or similar characteristics into the same family. It plays a crucial role in understanding notable malicious patterns and recovering from malware infections.
Minki Kim   +5 more
doaj   +1 more source

A Data Mining Classification Approach for Behavioral Malware Detection

open access: yesJournal of Computer Networks and Communications, 2016
Data mining techniques have numerous applications in malware detection. Classification method is one of the most popular data mining techniques. In this paper we present a data mining classification approach to detect malware behavior.
Monire Norouzi   +2 more
doaj   +1 more source

A Hybrid Approach for Android Malware Detection and Family Classification

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2021
With the increase in the popularity of mobile devices, malicious applications targeting Android platform have greatly increased. Malware is coded so prudently that it has become very complicated to identify.
Meghna Dhalaria, Ekta Gandotra
doaj   +1 more source

An Efficient Malware Classification Method Based on the AIFS-IDL and Multi-Feature Fusion

open access: yesInformation, 2022
In recent years, the presence of malware has been growing exponentially, resulting in enormous demand for efficient malware classification methods.
Xuan Wu, Yafei Song
doaj   +1 more source

Home - About - Disclaimer - Privacy