Results 21 to 30 of about 10,938 (187)

Features Engineering for Malware Family Classification Based API Call

open access: yesComputers, 2022
Malware is used to carry out malicious operations on networks and computer systems. Consequently, malware classification is crucial for preventing malicious attacks.
Ammar Yahya Daeef   +2 more
doaj   +1 more source

Visualizing compiled executables for malware analysis [PDF]

open access: yes2009 6th International Workshop on Visualization for Cyber Security, 2009
Reverse engineering compiled executables is a task with a steep learning curve. It is complicated by the task of translating assembly into a series of abstractions that represent the overall flow of a program. Most of the steps involve finding interesting areas of an executable and determining their overall functionality.
Daniel A. Quist, Lorie M. Liebrock
openaire   +1 more source

A New Learning Approach to Malware Classification Using Discriminative Feature Extraction

open access: yesIEEE Access, 2019
With the development of the Internet, malware has become one of the most significant threats. Recognizing specific types of malware is an important step toward effective removal.
Ya-shu Liu   +3 more
doaj   +1 more source

Spreading processes in Multilayer Networks [PDF]

open access: yes, 2014
Several systems can be modeled as sets of interconnected networks or networks with multiple types of connections, here generally called multilayer networks.
Magnani, Matteo   +5 more
core   +3 more sources

Review of malware detection and classification visualization techniques

open access: yes网络与信息安全学报, 2023
With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection ...
Jinwei WANG, Zhengjia CHEN, Xue XIE, Xiangyang LUO, Bin MA
doaj   +3 more sources

Efficient Windows malware identification and classification scheme for plant protection information systems

open access: yesFrontiers in Plant Science, 2023
Due to developments in science and technology, the field of plant protection and the information industry have become increasingly integrated, which has resulted in the creation of plant protection information systems.
Zhiguo Chen   +5 more
doaj   +1 more source

Malware Detection Using Binary Visualization and Neural Networks [PDF]

open access: yesE3S Web of Conferences, 2023
Any programme or code that is damaging to our systems or networks is known as Malware or malicious software. Malware attempts to infiltrate, damage, or destroy our gadgets such as computers, networks, tablets, and so on. Malware may also grant partial or
Jonnala Yamini Devi   +4 more
doaj   +1 more source

Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices [PDF]

open access: yes, 2018
A very common approach adopted to fight the increasing sophistication and dangerousness of malware and hacking is to introduce more complex authentication mechanisms.
Alessio, Merlo   +2 more
core   +1 more source

A Classification System for Visualized Malware Based on Multiple Autoencoder Models

open access: yesIEEE Access, 2021
In this paper, we propose a classification system that uses multiple autoencoder models for identifying malware images. It is crucial to accurately classify malware before we can deploy appropriate countermeasures to prevent them from spreading.
Jongkwan Lee, Jongdeog Lee
doaj   +1 more source

Benign-salient Region Based End-to-End Adversarial Malware Generation Method [PDF]

open access: yesJisuanji kexue
Malware detection methods combining visualization techniques and deep learning have gained widespread attention due to their high accuracy and low cost.However,deep learning models are vulnerable to adversarial attacks,where intentional small-scale ...
YUAN Mengjiao, LU Tianliang, HUANG Wanxin, HE Houhan
doaj   +1 more source

Home - About - Disclaimer - Privacy