Results 1 to 10 of about 46,394 (182)
SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System [PDF]
For the last few years, Android is known to be the most widely used operating system and this rapidly increasing popularity has attracted the malware developer's attention.
Saba Arshad +5 more
doaj +3 more sources
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments [PDF]
Malware has emerged as a significant threat to end-users, businesses, and governments, resulting in financial losses of billions of dollars. Cybercriminals have found malware to be a lucrative business because of its evolving capabilities and ability to ...
Jannatul Ferdous +3 more
doaj +2 more sources
Packed malware variants detection using deep belief networks [PDF]
Malware is one of the most serious network security threats. To detect unknown variants of malware, many researches have proposed various methods of malware detection based on machine learning in recent years.
Zhang Zhigang +3 more
doaj +1 more source
MalFuzz: Coverage-guided fuzzing on deep learning-based malware classification model.
With the continuous development of deep learning, more and more domains use deep learning technique to solve key problems. The security issues of deep learning models have also received more and more attention.
Yuying Liu +4 more
doaj +2 more sources
A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware.
Parvez Faruki +5 more
doaj +1 more source
Detecting Malware with Information Complexity [PDF]
Malware concealment is the predominant strategy for malware propagation. Black hats create variants of malware based on polymorphism and metamorphism. Malware variants, by definition, share some information. Although the concealment strategy alters this information, there are still patterns on the software.
Nadia Alshahwan +4 more
openaire +4 more sources
Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies.
Nor Zakiah Gorment +3 more
doaj +1 more source
Technique for IoT malware detection based on control flow graph analysis
The Internet of Things (IoT) refers to the millions of devices around the world that are connected to the Internet. Insecure IoT devices designed without proper security features are the targets of many Internet threats.
Kira Bobrovnikova +4 more
doaj +1 more source
Semantics-aware malware detection [PDF]
A malware detector is a system that attempts to determine whether a program has malicious intent. In order to evade detection, malware writers (hackers) frequently use obfuscation to morph malware. Malware detectors that use a pattern-matching approach (such as commercial virus scanners) are susceptible to obfuscations used by hackers.
Christodorescu, Mihai +4 more
openaire +1 more source
Malware variants are the major emerging threats that face cybersecurity due to the potential damage to computer systems. Many solutions have been proposed for detecting malware variants.
Abdulbasit A. Darem +5 more
doaj +1 more source

