Results 21 to 30 of about 707,343 (186)
An Analysis of Android Malware Classification Services
The increasing number of Android malware forced antivirus (AV) companies to rely on automated classification techniques to determine the family and class of suspicious samples.
Mohammed Rashed, Guillermo Suarez-Tangil
doaj +1 more source
Android Malware Characterization using Metadata and Machine Learning Techniques [PDF]
Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to ...
Guzmán, Antonio +3 more
core +2 more sources
Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to ...
Kinan Keshkeh +2 more
doaj +1 more source
Survey of Machine Learning Techniques for Malware Analysis [PDF]
Coping with malware is getting more and more challenging, given their relentless growth in complexity and volume. One of the most common approaches in literature is using machine learning techniques, to automatically learn models and patterns behind ...
Aniello, Leonardo +2 more
core +2 more sources
Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices
With the rapid expansion of the use of smartphone devices, malicious attacks against Android mobile devices have increased. The Android system adopted a wide range of sensitive applications such as banking applications; therefore, it is becoming the ...
Hasan Alkahtani, Theyazn H. H. Aldhyani
doaj +1 more source
Obfuscation-based malware update: A comparison of manual and automated methods [PDF]
Indexación: Scopus; Web of Science.This research presents a proposal of malware classification and its update based on capacity and obfuscation. This article is an extension of [4]a, and describes the procedure for malware updating, that is, to take ...
Barría, C. +4 more
core +2 more sources
A Survey of Malware Detection Using Deep Learning [PDF]
The problem of malicious software (malware) detection and classification is a complex task, and there is no perfect approach. There is still a lot of work to be done. Unlike most other research areas, standard benchmarks are difficult to find for malware
A. Bensaoud, J. Kalita, Mahmoud Bensaoud
semanticscholar +1 more source
Analysis and evaluation of SafeDroid v2.0, a framework for detecting malicious Android applications [PDF]
Android smartphones have become a vital component of the daily routine of millions of people, running a plethora of applications available in the official and alternative marketplaces.
Argyriou, Marios +2 more
core +2 more sources
An epidemic model for the investigation of multi‐malware attack in wireless sensor network
The protection of wireless sensor networks (WSN) against malware attacks is crucial. The paper discusses the issue of malware attacks in WSN, which are commonly used for monitoring and surveillance in various applications.
Shashank Awasthi +9 more
doaj +1 more source
PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware [PDF]
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents.
Cara, Fabrizio +3 more
core +2 more sources

