Results 21 to 30 of about 36,905 (167)

Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices

open access: yesSensors, 2022
With the rapid expansion of the use of smartphone devices, malicious attacks against Android mobile devices have increased. The Android system adopted a wide range of sensitive applications such as banking applications; therefore, it is becoming the ...
Hasan Alkahtani, Theyazn H. H. Aldhyani
doaj   +1 more source

Using HTML5 to Prevent Detection of Drive-by-Download Web Malware [PDF]

open access: yes, 2014
The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications.
De Maio, Giancarlo   +2 more
core   +2 more sources

An epidemic model for the investigation of multi‐malware attack in wireless sensor network

open access: yesIET Communications, 2023
The protection of wireless sensor networks (WSN) against malware attacks is crucial. The paper discusses the issue of malware attacks in WSN, which are commonly used for monitoring and surveillance in various applications.
Shashank Awasthi   +9 more
doaj   +1 more source

Unsupervised Anomaly-based Malware Detection using Hardware Features [PDF]

open access: yes, 2014
Recent works have shown promise in using microarchitectural execution patterns to detect malware programs. These detectors belong to a class of detectors known as signature-based detectors as they catch malware by comparing a program's execution pattern (
Sethumadhavan, Simha   +2 more
core   +4 more sources

BotDet: A System for Real Time Botnet Command and Control Traffic Detection

open access: yesIEEE Access, 2018
Over the past decade, the digitization of services transformed the healthcare sector leading to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled with high value of patient records attracted the attention of ...
Ibrahim Ghafir   +6 more
doaj   +1 more source

Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph [PDF]

open access: yes, 2015
As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns.
Jang, Jae-wook   +4 more
core   +3 more sources

Combined dynamic multi-feature and rule-based behavior for accurate malware detection

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Malware have become the scourge of the century, as they are continuously evolving and becoming more complex with increasing damages. Therefore, an adequate protection against such threats is vital.
Mohamed Belaoued   +5 more
doaj   +1 more source

Security Toolbox for Detecting Novel and Sophisticated Android Malware

open access: yes, 2015
This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project.
Deering, Tom   +4 more
core   +1 more source

Deep-Layer Clustering to Identify Permission Usage Patterns of Android App Categories

open access: yesIEEE Access, 2022
With the increasing usage of smartphones in banks, medical services and m-commerce, and the uploading of applications from unofficial sources, security has become a major concern for smartphone users. Malicious apps can steal passwords, leak details, and
Zakeya Namrud   +3 more
doaj   +1 more source

Malware Detection using Machine Learning and Deep Learning

open access: yes, 2019
Research shows that over the last decade, malware has been growing exponentially, causing substantial financial losses to various organizations. Different anti-malware companies have been proposing solutions to defend attacks from these malware.
A Nappa   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy