Results 41 to 50 of about 46,889 (202)

Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review

open access: yesTelematics and Informatics Reports
The ever-increasing growth of online services and smart connectivity of devices have posed the threat of malware to computer system, android-based smart phones, Internet of Things (IoT)-based systems.
Santosh K. Smmarwar   +2 more
doaj   +1 more source

Research on Application of Attention-CNN in Malware Detection

open access: yesJisuanji kexue yu tansuo, 2021
The attack of malware has become one of the most major threats to the Internet. What??s more, the existing malware data are huge and have multiple features. In order to extract the characteristics better and master the behaviors of malware, Attention-CNN
MA Dan, WAN Liang, CHENG Qiqin, SUN Zhiqiang
doaj   +1 more source

Intensive Malware Detection Approach based on Data Mining

open access: yesJournal of Applied Engineering and Technological Science, 2023
Malicious software, sometimes known as malware, is software designed to harm a computer, network, or any of the connected resources. Without the user's knowledge, malware can spread throughout their computer system. Malware is typically disseminated via
Israa Ezzat Salem, Karim Hashim Al-Saedi
doaj   +1 more source

Malware detection based on semi-supervised learning with malware visualization

open access: yesMathematical Biosciences and Engineering, 2021
The traditional signature-based detection method requires detailed manual analysis to extract the signatures of malicious samples, and requires a large number of manual markers to maintain the signature library, which brings a great time and resource costs, and makes it difficult to adapt to the rapid generation and mutation of malware.
Tan Gao, Lan Zhao, Xudong Li, Wen Chen
openaire   +3 more sources

On the Effectiveness of Perturbations in Generating Evasive Malware Variants

open access: yesIEEE Access, 2023
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin   +3 more
doaj   +1 more source

Software transformations to improve malware detection [PDF]

open access: yes, 2007
Malware is code designed for a malicious purpose, such as obtaining root privilege on a host. A malware detector identifies malware and thus prevents it from adversely affecting a host. In order to evade detection, malware writers use various obfuscation
G. McGraw   +7 more
core   +2 more sources

Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection

open access: yesApplied Sciences, 2022
As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware.
Abimbola G. Akintola   +9 more
doaj   +1 more source

Learning the PE Header, Malware Detection with Minimal Domain Knowledge

open access: yes, 2017
Many efforts have been made to use various forms of domain knowledge in malware detection. Currently there exist two common approaches to malware detection without domain knowledge, namely byte n-grams and strings. In this work we explore the feasibility
Nicholas, Charles   +2 more
core   +1 more source

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System

open access: yesIEEE Access, 2018
For the last few years, Android is known to be the most widely used operating system and this rapidly increasing popularity has attracted the malware developer's attention.
Saba Arshad   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy