Results 21 to 30 of about 10,938 (187)
Features Engineering for Malware Family Classification Based API Call
Malware is used to carry out malicious operations on networks and computer systems. Consequently, malware classification is crucial for preventing malicious attacks.
Ammar Yahya Daeef +2 more
doaj +1 more source
Visualizing compiled executables for malware analysis [PDF]
Reverse engineering compiled executables is a task with a steep learning curve. It is complicated by the task of translating assembly into a series of abstractions that represent the overall flow of a program. Most of the steps involve finding interesting areas of an executable and determining their overall functionality.
Daniel A. Quist, Lorie M. Liebrock
openaire +1 more source
A New Learning Approach to Malware Classification Using Discriminative Feature Extraction
With the development of the Internet, malware has become one of the most significant threats. Recognizing specific types of malware is an important step toward effective removal.
Ya-shu Liu +3 more
doaj +1 more source
Spreading processes in Multilayer Networks [PDF]
Several systems can be modeled as sets of interconnected networks or networks with multiple types of connections, here generally called multilayer networks.
Magnani, Matteo +5 more
core +3 more sources
Review of malware detection and classification visualization techniques
With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection ...
Jinwei WANG, Zhengjia CHEN, Xue XIE, Xiangyang LUO, Bin MA
doaj +3 more sources
Due to developments in science and technology, the field of plant protection and the information industry have become increasingly integrated, which has resulted in the creation of plant protection information systems.
Zhiguo Chen +5 more
doaj +1 more source
Malware Detection Using Binary Visualization and Neural Networks [PDF]
Any programme or code that is damaging to our systems or networks is known as Malware or malicious software. Malware attempts to infiltrate, damage, or destroy our gadgets such as computers, networks, tablets, and so on. Malware may also grant partial or
Jonnala Yamini Devi +4 more
doaj +1 more source
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices [PDF]
A very common approach adopted to fight the increasing sophistication and dangerousness of malware and hacking is to introduce more complex authentication mechanisms.
Alessio, Merlo +2 more
core +1 more source
A Classification System for Visualized Malware Based on Multiple Autoencoder Models
In this paper, we propose a classification system that uses multiple autoencoder models for identifying malware images. It is crucial to accurately classify malware before we can deploy appropriate countermeasures to prevent them from spreading.
Jongkwan Lee, Jongdeog Lee
doaj +1 more source
Benign-salient Region Based End-to-End Adversarial Malware Generation Method [PDF]
Malware detection methods combining visualization techniques and deep learning have gained widespread attention due to their high accuracy and low cost.However,deep learning models are vulnerable to adversarial attacks,where intentional small-scale ...
YUAN Mengjiao, LU Tianliang, HUANG Wanxin, HE Houhan
doaj +1 more source

