Results 31 to 40 of about 46,889 (202)
Malware and Malware Detection Techniques: A Survey
Abstract: Malicious software is a kind of software or codes which took some: private data, information from the PC framework, its tasks is to do only malicious objectives to the PC framework, without authorization of the PC clients. The effect of malicious software are worsen to the client.
Sahil Sehrawat, Dr. Dinesh Singh
openaire +1 more source
Android Malware Characterization using Metadata and Machine Learning Techniques [PDF]
Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to ...
Guzmán, Antonio +3 more
core +2 more sources
Performance Monitoring Counter Based Intelligent Malware Detection and Design Alternatives
Hardware solutions for malware detection are becoming increasingly important as software-based solutions can be easily compromised by intelligent malware.
Jordan Pattee +2 more
doaj +1 more source
BCARET Model Checking for Malware Detection [PDF]
The number of malware is growing significantly fast. Traditional malware detectors based on signature matching or code emulation are easy to get around. To overcome this problem, model-checking emerges as a technique that has been extensively applied for malware detection recently.
Nguyen, Huu Vu, Touili, Tayssir
openaire +3 more sources
A survey of IoT malware and detection methods based on static features
Due to a lack of security design as well as the specific characteristics of IoT devices such as the heterogeneity of processor architecture, IoT malware detection has to deal with very unique challenges, especially on detecting cross-architecture IoT ...
Quoc-Dung Ngo +3 more
doaj +1 more source
SMASH: A Malware Detection Method Based on Multi-Feature Ensemble Learning
With the increasing variants of malware, it is of great significance to detect malware and ensure system security effectively. The existing malware dynamic detection methods are vulnerable to evasion attacks.
Yusheng Dai +4 more
doaj +1 more source
Investigation of bypassing malware defences and malware detections [PDF]
Nowadays, malware incident is one of the most expensive damages caused by attackers. Malwares are caused different attacks, so considerations and implementations of malware defences for internal networks are important. In this papers, different techniques such as repacking, reverse engineering and hex editing for bypassing host-based Anti Virus (AV ...
Farid Daryabar +2 more
openaire +1 more source
With the rise in popularity and usage of Android operating systems, malicious applications are targeted by applying innovative ways and techniques.
Sana Aurangzeb, Muhammad Aleem
doaj +1 more source
Android Malware Category and Family Identification Using Parallel Machine Learning [PDF]
Android malware is one of the most dangerous threats on the Internet. It has been on the rise for several years. As a result, it has impacted many applications such as healthcare, banking, transportation, government, e-commerce, etc.
Ahmed Hashem El Fiky +2 more
doaj +1 more source
Metamorphic malware detection using base malware identification approach [PDF]
ABSTRACTMalware is a malicious program that is intentionally developed to harm computer systems. Because the metamorphic malwares are advanced in nature, they mutate their code in each generation by employing code obfuscation techniques to thwart detection. Conventional scanners even fail to detect all variants of such malware.
Devendra Kumar Mahawer, A. Nagaraju
openaire +1 more source

