Results 21 to 30 of about 1,405 (158)

Visualizing compiled executables for malware analysis [PDF]

open access: yes2009 6th International Workshop on Visualization for Cyber Security, 2009
Reverse engineering compiled executables is a task with a steep learning curve. It is complicated by the task of translating assembly into a series of abstractions that represent the overall flow of a program. Most of the steps involve finding interesting areas of an executable and determining their overall functionality.
Daniel A. Quist, Lorie M. Liebrock
openaire   +1 more source

A New Learning Approach to Malware Classification Using Discriminative Feature Extraction

open access: yesIEEE Access, 2019
With the development of the Internet, malware has become one of the most significant threats. Recognizing specific types of malware is an important step toward effective removal.
Ya-shu Liu   +3 more
doaj   +1 more source

Review of malware detection and classification visualization techniques

open access: yes网络与信息安全学报, 2023
With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection ...
Jinwei WANG, Zhengjia CHEN, Xue XIE, Xiangyang LUO, Bin MA
doaj   +3 more sources

Malware Detection Using Binary Visualization and Neural Networks [PDF]

open access: yesE3S Web of Conferences, 2023
Any programme or code that is damaging to our systems or networks is known as Malware or malicious software. Malware attempts to infiltrate, damage, or destroy our gadgets such as computers, networks, tablets, and so on. Malware may also grant partial or
Jonnala Yamini Devi   +4 more
doaj   +1 more source

Efficient Windows malware identification and classification scheme for plant protection information systems

open access: yesFrontiers in Plant Science, 2023
Due to developments in science and technology, the field of plant protection and the information industry have become increasingly integrated, which has resulted in the creation of plant protection information systems.
Zhiguo Chen   +5 more
doaj   +1 more source

Classification and Analysis of Android Malware Images Using Feature Fusion Technique

open access: yesIEEE Access, 2021
The super packed functionalities and artificial intelligence (AI)-powered applications have made the Android operating system a big player in the market.
Jaiteg Singh   +5 more
doaj   +1 more source

Benign-salient Region Based End-to-End Adversarial Malware Generation Method [PDF]

open access: yesJisuanji kexue
Malware detection methods combining visualization techniques and deep learning have gained widespread attention due to their high accuracy and low cost.However,deep learning models are vulnerable to adversarial attacks,where intentional small-scale ...
YUAN Mengjiao, LU Tianliang, HUANG Wanxin, HE Houhan
doaj   +1 more source

A Classification System for Visualized Malware Based on Multiple Autoencoder Models

open access: yesIEEE Access, 2021
In this paper, we propose a classification system that uses multiple autoencoder models for identifying malware images. It is crucial to accurately classify malware before we can deploy appropriate countermeasures to prevent them from spreading.
Jongkwan Lee, Jongdeog Lee
doaj   +1 more source

Efficient Malware Analysis Using Subspace-Based Methods on Representative Image Patterns

open access: yesIEEE Access, 2023
In this paper, we propose a new framework for classifying and visualizing malware files using subspace-based methods. The rise of advanced malware poses a significant threat to internet security, increasing the pressure on traditional cybersecurity ...
Djafer Yahia M Benchadi   +2 more
doaj   +1 more source

Cybercopters Swarm: Immersive analytics for alerts classification based on periodic data

open access: yesFrontiers in Virtual Reality, 2023
This paper assesses the usefulness of an interactive and navigable 3D environment to help decision-making in cybersecurity. Malware programs frequently emit periodic signals in network logs; however, normal periodical network activities, such as software
Nicolas Delcombel   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy