Results 1 to 10 of about 46,394 (182)

SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System [PDF]

open access: yesIEEE Access, 2018
For the last few years, Android is known to be the most widely used operating system and this rapidly increasing popularity has attracted the malware developer's attention.
Saba Arshad   +5 more
doaj   +3 more sources

A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments [PDF]

open access: yesSensors
Malware has emerged as a significant threat to end-users, businesses, and governments, resulting in financial losses of billions of dollars. Cybercriminals have found malware to be a lucrative business because of its evolving capabilities and ability to ...
Jannatul Ferdous   +3 more
doaj   +2 more sources

Packed malware variants detection using deep belief networks [PDF]

open access: yesMATEC Web of Conferences, 2020
Malware is one of the most serious network security threats. To detect unknown variants of malware, many researches have proposed various methods of malware detection based on machine learning in recent years.
Zhang Zhigang   +3 more
doaj   +1 more source

MalFuzz: Coverage-guided fuzzing on deep learning-based malware classification model.

open access: yesPLoS ONE, 2022
With the continuous development of deep learning, more and more domains use deep learning technique to solve key problems. The security issues of deep learning models have also received more and more attention.
Yuying Liu   +4 more
doaj   +2 more sources

A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks

open access: yesInformation, 2023
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware.
Parvez Faruki   +5 more
doaj   +1 more source

Detecting Malware with Information Complexity [PDF]

open access: yesEntropy, 2020
Malware concealment is the predominant strategy for malware propagation. Black hats create variants of malware based on polymorphism and metamorphism. Malware variants, by definition, share some information. Although the concealment strategy alters this information, there are still patterns on the software.
Nadia Alshahwan   +4 more
openaire   +4 more sources

Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions

open access: yesIEEE Access, 2023
Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies.
Nor Zakiah Gorment   +3 more
doaj   +1 more source

Technique for IoT malware detection based on control flow graph analysis

open access: yesРадіоелектронні і комп'ютерні системи, 2022
The Internet of Things (IoT) refers to the millions of devices around the world that are connected to the Internet. Insecure IoT devices designed without proper security features are the targets of many Internet threats.
Kira Bobrovnikova   +4 more
doaj   +1 more source

Semantics-aware malware detection [PDF]

open access: yes2005 IEEE Symposium on Security and Privacy (S&P'05), 2005
A malware detector is a system that attempts to determine whether a program has malicious intent. In order to evade detection, malware writers (hackers) frequently use obfuscation to morph malware. Malware detectors that use a pattern-matching approach (such as commercial virus scanners) are susceptible to obfuscations used by hackers.
Christodorescu, Mihai   +4 more
openaire   +1 more source

An Adaptive Behavioral-Based Incremental Batch Learning Malware Variants Detection Model Using Concept Drift Detection and Sequential Deep Learning

open access: yesIEEE Access, 2021
Malware variants are the major emerging threats that face cybersecurity due to the potential damage to computer systems. Many solutions have been proposed for detecting malware variants.
Abdulbasit A. Darem   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy