Results 31 to 40 of about 46,394 (182)

Malware and Malware Detection Techniques: A Survey

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
Abstract: Malicious software is a kind of software or codes which took some: private data, information from the PC framework, its tasks is to do only malicious objectives to the PC framework, without authorization of the PC clients. The effect of malicious software are worsen to the client.
Sahil Sehrawat, Dr. Dinesh Singh
openaire   +1 more source

Performance Monitoring Counter Based Intelligent Malware Detection and Design Alternatives

open access: yesIEEE Access, 2022
Hardware solutions for malware detection are becoming increasingly important as software-based solutions can be easily compromised by intelligent malware.
Jordan Pattee   +2 more
doaj   +1 more source

Using HTML5 to Prevent Detection of Drive-by-Download Web Malware [PDF]

open access: yes, 2014
The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications.
De Maio, Giancarlo   +2 more
core   +2 more sources

BCARET Model Checking for Malware Detection [PDF]

open access: yesProceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, 2017
The number of malware is growing significantly fast. Traditional malware detectors based on signature matching or code emulation are easy to get around. To overcome this problem, model-checking emerges as a technique that has been extensively applied for malware detection recently.
Nguyen, Huu Vu, Touili, Tayssir
openaire   +3 more sources

Evaluation and classification of obfuscated Android malware through deep learning using ensemble voting mechanism

open access: yesScientific Reports, 2023
With the rise in popularity and usage of Android operating systems, malicious applications are targeted by applying innovative ways and techniques.
Sana Aurangzeb, Muhammad Aleem
doaj   +1 more source

SMASH: A Malware Detection Method Based on Multi-Feature Ensemble Learning

open access: yesIEEE Access, 2019
With the increasing variants of malware, it is of great significance to detect malware and ensure system security effectively. The existing malware dynamic detection methods are vulnerable to evasion attacks.
Yusheng Dai   +4 more
doaj   +1 more source

A survey of IoT malware and detection methods based on static features

open access: yesICT Express, 2020
Due to a lack of security design as well as the specific characteristics of IoT devices such as the heterogeneity of processor architecture, IoT malware detection has to deal with very unique challenges, especially on detecting cross-architecture IoT ...
Quoc-Dung Ngo   +3 more
doaj   +1 more source

Android Malware Category and Family Identification Using Parallel Machine Learning [PDF]

open access: yesJournal of Information Technology Management, 2022
Android malware is one of the most dangerous threats on the Internet.  It has been on the rise for several years.  As a result, it has impacted many applications such as healthcare, banking, transportation, government, e-commerce, etc.
Ahmed Hashem El Fiky   +2 more
doaj   +1 more source

Software transformations to improve malware detection [PDF]

open access: yes, 2007
Malware is code designed for a malicious purpose, such as obtaining root privilege on a host. A malware detector identifies malware and thus prevents it from adversely affecting a host. In order to evade detection, malware writers use various obfuscation
G. McGraw   +7 more
core   +2 more sources

Investigation of bypassing malware defences and malware detections [PDF]

open access: yes2011 7th International Conference on Information Assurance and Security (IAS), 2011
Nowadays, malware incident is one of the most expensive damages caused by attackers. Malwares are caused different attacks, so considerations and implementations of malware defences for internal networks are important. In this papers, different techniques such as repacking, reverse engineering and hex editing for bypassing host-based Anti Virus (AV ...
Farid Daryabar   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy