Results 11 to 20 of about 46,394 (182)

The rise of obfuscated Android malware and impacts on detection methods [PDF]

open access: yesPeerJ Computer Science, 2022
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious
Wael F. Elsersy   +2 more
doaj   +2 more sources

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

HMLET: Hunt Malware Using Wavelet Transform on Cross-Platform

open access: yesIEEE Access, 2022
As the importance of cyberspace grows, malicious software (malware) is threatening not only individuals but also countries. In addition, numerous malware is still circulating in cyberspace, and as technology advances, new or advanced malware are emerging.
Sangmin Park   +2 more
doaj   +1 more source

Automated System-Level Malware Detection Using Machine Learning: A Comprehensive Review

open access: yesApplied Sciences, 2023
Malware poses a significant threat to computer systems and networks. This necessitates the development of effective detection mechanisms. Detection mechanisms dependent on signatures for attack detection perform poorly due to high false negatives.
Nana Kwame Gyamfi   +3 more
doaj   +1 more source

Morphological detection of malware [PDF]

open access: yes2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), 2008
In the field of malware detection, method based on syntactical consideration are usually efficient. However, they are strongly vulnerable to obfuscation techniques. This study proposes an efficient construction of a morphological malware detector based on a syntactic and a semantic analysis, technically on control flow graphs of programs (CFG).
Bonfante, Guillaume   +2 more
openaire   +2 more sources

A Comprehensive Review on Malware Detection Approaches

open access: yesIEEE Access, 2020
According to the recent studies, malicious software (malware) is increasing at an alarming rate, and some malware can hide in the system by using different obfuscation techniques.
Omer Aslan, Refik Samet
doaj   +1 more source

Malware Detection Using System Logs [PDF]

open access: yesProceedings of the 2020 ACM Workshop on Intelligent Cross-Data Analysis and Retrieval, 2020
Malware detection is one of the most critical features in many real applications, especially for the mobile platform and the Internet of Things (IoT) technology. Due to the proliferation of mobile devices and the associated app-stores, the volume of new applications growing extremely fast requires a better way to analyze all possible malicious ...
Nguyen, Nhu T.   +6 more
openaire   +1 more source

A Systematic Literature Review of Android Malware Detection Using Static Analysis

open access: yesIEEE Access, 2020
Android malware has been in an increasing trend in recent years due to the pervasiveness of Android operating system. Android malware is installed and run on the smartphones without explicitly prompting the users or without the user's permission, and it ...
Ya Pan   +3 more
doaj   +1 more source

Android malware category detection using a novel feature vector-based machine learning model

open access: yesCybersecurity, 2023
Malware attacks on the Android platform are rapidly increasing due to the high consumer adoption of Android smartphones. Advanced technologies have motivated cyber-criminals to actively create and disseminate a wide range of malware on Android ...
Hashida Haidros Rahima Manzil   +1 more
doaj   +1 more source

Malware Detection Using Memory Analysis Data in Big Data Environment

open access: yesApplied Sciences, 2022
Malware is a significant threat that has grown with the spread of technology. This makes detecting malware a critical issue. Static and dynamic methods are widely used in the detection of malware. However, traditional static and dynamic malware detection
Murat Dener, Gökçe Ok, Abdullah Orman
doaj   +1 more source

Home - About - Disclaimer - Privacy