Results 91 to 100 of about 46,394 (182)

An Android Malicious Code Detection Method Based on Improved DCA Algorithm

open access: yesEntropy, 2017
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static ...
Chundong Wang   +5 more
doaj   +1 more source

A study of the relationship of malware detection mechanisms using Artificial Intelligence

open access: yesICT Express
Implementation of malware detection using Artificial Intelligence (AI) has emerged as a significant research theme to combat evolving various types of malwares.
Jihyeon Song   +6 more
doaj   +1 more source

Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar

open access: yesFuture Internet
We propose a detection system incorporating a weighted voting mechanism that reflects the vote’s reliability based on the accuracy of each detector’s examination, which overcomes the problem of cooperative detection. Collaborative malware detection is an
Naonobu Okazaki   +6 more
doaj   +1 more source

Stateless Malware Packet Detection by Incorporating Naive Bayes with Known Malware Signatures

open access: yesApplied Computational Intelligence and Soft Computing, 2014
Malware detection done at the network infrastructure level is still an open research problem ,considering the evolution of malwares and high detection accuracy needed to detect these threats.
Ismahani Ismail   +2 more
doaj   +1 more source

Hybrid Input Model Using Multiple Features From Surface Analysis for Malware Detection

open access: yesIEEE Access
Many malware detection models have been proposed to protect computers from the ever- increasing number of malware attacks. The features that are obtained from surface analysis and machine learning are often used for malware detection.
Mamoru Mimura, Satoki Kanno
doaj   +1 more source

MIDALF—multimodal image and audio late fusion for malware detection

open access: yesEURASIP Journal on Information Security
Malware detection remains a critical challenge in cybersecurity due to the rapid evolution of sophisticated malware and adversarial threats. Traditional detection systems struggle to adapt to dynamic malware behavior and are particularly vulnerable to ...
Setia Juli Irzal Ismail   +4 more
doaj   +1 more source

GNSTAM: Integrating Graph Networks With Spatial and Temporal Signature Analysis for Enhanced Android Malware Detection

open access: yesIEEE Access
The sophistication of Android malware poses significant threats to user security and privacy. Traditional detection methods struggle with rapid malware evolution and benign application diversity, leading to high false positive rates and limited ...
Yogesh Kumar Sharma   +3 more
doaj   +1 more source

Detection of unseen malware threats using generative adversarial networks and deep learning models

open access: yesScientific Reports
The fast advancement of malware makes it an urgent problem for cybersecurity, as perpetrators consistently devise obfuscation methods to avoid detection.
Chirag Joshi   +2 more
doaj   +1 more source

Incremental clustering method based on Gaussian mixture model to identify malware family

open access: yesTongxin xuebao, 2019
Aiming at the logical similarity of the behavioral characteristics of malware belonging to the same family,the characteristics of malware were extracted by tracking the logic rules of API function call from the perspective of behavior detection,and the ...
Jianwei HU   +3 more
doaj  

Home - About - Disclaimer - Privacy