Results 41 to 50 of about 46,889 (202)
The ever-increasing growth of online services and smart connectivity of devices have posed the threat of malware to computer system, android-based smart phones, Internet of Things (IoT)-based systems.
Santosh K. Smmarwar +2 more
doaj +1 more source
Research on Application of Attention-CNN in Malware Detection
The attack of malware has become one of the most major threats to the Internet. What??s more, the existing malware data are huge and have multiple features. In order to extract the characteristics better and master the behaviors of malware, Attention-CNN
MA Dan, WAN Liang, CHENG Qiqin, SUN Zhiqiang
doaj +1 more source
Intensive Malware Detection Approach based on Data Mining
Malicious software, sometimes known as malware, is software designed to harm a computer, network, or any of the connected resources. Without the user's knowledge, malware can spread throughout their computer system. Malware is typically disseminated via
Israa Ezzat Salem, Karim Hashim Al-Saedi
doaj +1 more source
Malware detection based on semi-supervised learning with malware visualization
The traditional signature-based detection method requires detailed manual analysis to extract the signatures of malicious samples, and requires a large number of manual markers to maintain the signature library, which brings a great time and resource costs, and makes it difficult to adapt to the rapid generation and mutation of malware.
Tan Gao, Lan Zhao, Xudong Li, Wen Chen
openaire +3 more sources
On the Effectiveness of Perturbations in Generating Evasive Malware Variants
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin +3 more
doaj +1 more source
Software transformations to improve malware detection [PDF]
Malware is code designed for a malicious purpose, such as obtaining root privilege on a host. A malware detector identifies malware and thus prevents it from adversely affecting a host. In order to evade detection, malware writers use various obfuscation
G. McGraw +7 more
core +2 more sources
As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware.
Abimbola G. Akintola +9 more
doaj +1 more source
Learning the PE Header, Malware Detection with Minimal Domain Knowledge
Many efforts have been made to use various forms of domain knowledge in malware detection. Currently there exist two common approaches to malware detection without domain knowledge, namely byte n-grams and strings. In this work we explore the feasibility
Nicholas, Charles +2 more
core +1 more source
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti +4 more
wiley +1 more source
SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System
For the last few years, Android is known to be the most widely used operating system and this rapidly increasing popularity has attracted the malware developer's attention.
Saba Arshad +5 more
doaj +1 more source

