Results 11 to 20 of about 46,889 (202)

A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments [PDF]

open access: yesSensors
Malware has emerged as a significant threat to end-users, businesses, and governments, resulting in financial losses of billions of dollars. Cybercriminals have found malware to be a lucrative business because of its evolving capabilities and ability to ...
Jannatul Ferdous   +3 more
doaj   +2 more sources

LEDA—Layered Event-Based Malware Detection Architecture [PDF]

open access: yesSensors
The rapid increase in new malware necessitates effective detection methods. While machine learning techniques have shown promise for malware detection, most research focuses on identifying malware through the content of executable files or full behavior ...
Radu Marian Portase   +3 more
doaj   +2 more sources

Packed malware variants detection using deep belief networks [PDF]

open access: yesMATEC Web of Conferences, 2020
Malware is one of the most serious network security threats. To detect unknown variants of malware, many researches have proposed various methods of malware detection based on machine learning in recent years.
Zhang Zhigang   +3 more
doaj   +1 more source

MalFuzz: Coverage-guided fuzzing on deep learning-based malware classification model.

open access: yesPLoS ONE, 2022
With the continuous development of deep learning, more and more domains use deep learning technique to solve key problems. The security issues of deep learning models have also received more and more attention.
Yuying Liu   +4 more
doaj   +2 more sources

A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks

open access: yesInformation, 2023
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware.
Parvez Faruki   +5 more
doaj   +1 more source

Detecting Malware with Information Complexity [PDF]

open access: yesEntropy, 2020
Malware concealment is the predominant strategy for malware propagation. Black hats create variants of malware based on polymorphism and metamorphism. Malware variants, by definition, share some information. Although the concealment strategy alters this information, there are still patterns on the software.
Nadia Alshahwan   +4 more
openaire   +4 more sources

Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions

open access: yesIEEE Access, 2023
Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies.
Nor Zakiah Gorment   +3 more
doaj   +1 more source

Technique for IoT malware detection based on control flow graph analysis

open access: yesРадіоелектронні і комп'ютерні системи, 2022
The Internet of Things (IoT) refers to the millions of devices around the world that are connected to the Internet. Insecure IoT devices designed without proper security features are the targets of many Internet threats.
Kira Bobrovnikova   +4 more
doaj   +1 more source

Semantics-aware malware detection [PDF]

open access: yes2005 IEEE Symposium on Security and Privacy (S&P'05), 2005
A malware detector is a system that attempts to determine whether a program has malicious intent. In order to evade detection, malware writers (hackers) frequently use obfuscation to morph malware. Malware detectors that use a pattern-matching approach (such as commercial virus scanners) are susceptible to obfuscations used by hackers.
Christodorescu, Mihai   +4 more
openaire   +1 more source

An Adaptive Behavioral-Based Incremental Batch Learning Malware Variants Detection Model Using Concept Drift Detection and Sequential Deep Learning

open access: yesIEEE Access, 2021
Malware variants are the major emerging threats that face cybersecurity due to the potential damage to computer systems. Many solutions have been proposed for detecting malware variants.
Abdulbasit A. Darem   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy