Results 131 to 140 of about 1,405 (158)
Some of the next articles are maybe not open access.

Visual attention for malware classification

Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications IV, 2022
Amidst the extensive global integration of computer systems and augmented connectivity, there have been numerous difficulties within ensuring confidentiality, integrity and availability across all systems. Malware is an ever-present and persistent challenge for security systems of all sorts.
Alsadi N   +5 more
openaire   +2 more sources

Malware visualization and detection using DenseNets

Personal and Ubiquitous Computing, 2021
Rapid advancement in the sophistication of malware has posed a serious impact on the device connected over the Internet. Malware writing is driven by economic benefits; thus, an alarming increase in malware variants is witnessed. Recently, a large volume of malware attacks are reported on Internet of Things (IoT) networks; as these devices are exposed ...
V. Anandhi, P. Vinod, Varun G. Menon
openaire   +1 more source

Image visualization based malware detection

2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 2013
Malware detection is one of the challenging tasks in Cyber security. The advent of code obfuscation, metamorphic malware, packers and zero day attacks has made malware detection a challenging task. In this paper we present a visualization based approach for malware detection.
Kesav Kancherla, Srinivas Mukkamala
openaire   +1 more source

Visualizing a Malware Distribution Network

2016 IEEE Symposium on Visualization for Cyber Security (VizSec), 2016
In this paper, we present a case study of visual analytics of a Malware Distribution Network (MDN), a connected set of maliciously compromised domains used to disseminate malicious software to victimize computers and users. We formally define the graph of an MDN to visualize top-level-domain (TLD) data collected from Google Safe Browsing reports in a ...
Sebastian Peryt   +5 more
openaire   +1 more source

Byte Visualization Method for Malware Classification

Proceedings of the 2020 5th International Conference on Machine Learning Technologies, 2020
The exponential increase in the number of malware stems from the fact that attackers often create malware variants with automated tools. And automated tools generally tend to reuse similar function modules. It is essential, therefore, that security analysts distinguish malware families by recognizing similar modules.
Zhuojun Ren, Guang Chen, Wenke Lu
openaire   +1 more source

Experiments with Malware Visualization

2013
This paper proposes DotPlot visualizations [1,8] for comparing and clustering malware. We describe how to process and customize the malware memory images to get robust and scalable visualizations. We demonstrate the effectiveness of the visualizations for analysing, comparing and clustering malware.
Yongzheng Wu, Roland H. C. Yap
openaire   +1 more source

Visualization techniques for efficient malware detection

2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Traditional tools for reverse engineering of binary and PE files are limited to heavy text base output, thus requiring skilled analysts to use them. In this paper, we present techniques that will visualize PE files, which will help analysts with basic skills to quickly understand their underlying structure.
John Donahue   +2 more
openaire   +1 more source

A few-shot malware classification approach for unknown family recognition using malware feature visualization

Computers & Security, 2022
With the ever-increasing threat of malware attacks, building an effective malware classifier to detect malware promptly is of utmost importance. Malware visualization approaches and deep learning techniques have proven effective in classifying sophisticated malware from benchmark datasets.
Conti M., Khandhar S., Vinod P.
openaire   +4 more sources

Visualization Approach for Malware Classification with ResNeXt

2020 IEEE Congress on Evolutionary Computation (CEC), 2020
The Internet has resulted in cyber-threats and cyber-crimes, which can occur anywhere at any time. Among various cyber threats, modern malware with applied metamorphosis and polymorphic technology is a concern as it can proliferate to advanced variants from its original shape.
Jin Ho Go   +5 more
openaire   +1 more source

Analysis of Visualization Techniques for Malware Detection

2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2020
Due to the steady growth of various sophisticated types of malware, different malware analysis systems are becoming more and more demanded. While there are various automatic approaches available to identify and detect malware, the malware analysis is still time-consuming process.
Anastasia Kartel   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy