Results 21 to 30 of about 707,343 (186)

An Analysis of Android Malware Classification Services

open access: yesSensors, 2021
The increasing number of Android malware forced antivirus (AV) companies to rely on automated classification techniques to determine the family and class of suspicious samples.
Mohammed Rashed, Guillermo Suarez-Tangil
doaj   +1 more source

Android Malware Characterization using Metadata and Machine Learning Techniques [PDF]

open access: yes, 2017
Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to ...
Guzmán, Antonio   +3 more
core   +2 more sources

A MACHINE LEARNING CLASSIFICATION APPROACH TO DETECT TLS-BASED MALWARE USING ENTROPY-BASED FLOW SET FEATURES

open access: yesJournal of ICT, 2022
Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to ...
Kinan Keshkeh   +2 more
doaj   +1 more source

Survey of Machine Learning Techniques for Malware Analysis [PDF]

open access: yes, 2018
Coping with malware is getting more and more challenging, given their relentless growth in complexity and volume. One of the most common approaches in literature is using machine learning techniques, to automatically learn models and patterns behind ...
Aniello, Leonardo   +2 more
core   +2 more sources

Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices

open access: yesSensors, 2022
With the rapid expansion of the use of smartphone devices, malicious attacks against Android mobile devices have increased. The Android system adopted a wide range of sensitive applications such as banking applications; therefore, it is becoming the ...
Hasan Alkahtani, Theyazn H. H. Aldhyani
doaj   +1 more source

Obfuscation-based malware update: A comparison of manual and automated methods [PDF]

open access: yes, 2017
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C.   +4 more
core   +2 more sources

A Survey of Malware Detection Using Deep Learning [PDF]

open access: yesarXiv.org
The problem of malicious software (malware) detection and classification is a complex task, and there is no perfect approach. There is still a lot of work to be done. Unlike most other research areas, standard benchmarks are difficult to find for malware
A. Bensaoud, J. Kalita, Mahmoud Bensaoud
semanticscholar   +1 more source

Analysis and evaluation of SafeDroid v2.0, a framework for detecting malicious Android applications [PDF]

open access: yes, 2018
Android smartphones have become a vital component of the daily routine of millions of people, running a plethora of applications available in the official and alternative marketplaces.
Argyriou, Marios   +2 more
core   +2 more sources

An epidemic model for the investigation of multi‐malware attack in wireless sensor network

open access: yesIET Communications, 2023
The protection of wireless sensor networks (WSN) against malware attacks is crucial. The paper discusses the issue of malware attacks in WSN, which are commonly used for monitoring and surveillance in various applications.
Shashank Awasthi   +9 more
doaj   +1 more source

PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]

open access: yes, 2019
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy