We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 373 results
  1. A smart contract vulnerability detection method based on deep learning with opcode sequences

    Ethereum is a blockchain network that allows developers to create smart contracts and programs that run on the blockchain. Smart contracts contain...

    Peiqiang Li, Guojun Wang, ... Guangxin Zhai in Peer-to-Peer Networking and Applications
    Article 27 June 2024
  2. An Efficient Hybrid Approach for Malware Detection Using Frequent Opcodes and API Call Sequences

    Malicious software attacks are increasing every day despite so many preventive measures, and many detection mechanisms are available in the...
    Om Prakash Samantray, Satya Narayan Tripathy in Computational Intelligence
    Conference paper 2023
  3. Malware Detection Based on Opcode Sequence and ResNet

    Nowadays, it is challenging for traditional static malware detection method to keep pace with the rapid development of malware variants, therefore...
    Xuetao Zhang, Meng Sun, ... **shuang Wang in Security with Intelligent Computing and Big-data Services
    Conference paper 2020
  4. Instruction-Level Power Side-Channel Leakage Evaluation of Soft-Core CPUs on Shared FPGAs

    Side-channel disassembly attacks recover CPU instructions from power or electromagnetic side-channel traces measured during code execution. These...

    Ognjen Glamočanin, Shashwat Shrivastava, ... Mirjana Stojilović in Journal of Hardware and Systems Security
    Article Open access 01 September 2023
  5. An Efficient Cross-Contract Vulnerability Detection Model Integrating Machine Learning and Fuzz Testing

    Due to the lengthy processing time associated with traditional fuzz testing methods for identifying vulnerable contracts, we have integrated machine...
    Huipeng Liu, Baojiang Cui, ... Lihua Niu in Advances in Internet, Data & Web Technologies
    Conference paper 2024
  6. Static Signature-Based Malware Detection Using Opcode and Binary Information

    Internet continues to evolve and touches every aspect of our daily life thus communications through internet is becoming inevitable. Computer...
    Azadeh Jalilian, Zahra Narimani, Ebrahim Ansari in Data Science: From Research to Application
    Conference paper 2020
  7. Android Rogue Application Detection Using Image Resemblance and Reduced LDA

    Nowadays, the expanding diffusion ofAcharya, Saket AndroidRawat, Umashankar phonesBhatnagar, Roheet along with the substantial usage of mobile...
    Saket Acharya, Umashankar Rawat, Roheet Bhatnagar in Advanced Machine Learning Technologies and Applications
    Conference paper 2021
  8. IoT-Malware Classification Model Using Byte Sequences and Supervised Learning Techniques

    Internet of things (IoT) provides us a way of interconnecting various mobile devices, handheld devices to accomplish tasks in diversified sectors....
    Om Prakash Samantray, Satya Narayan Tripathy in Next Generation of Internet of Things
    Conference paper 2021
  9. Deep Learning Based Malware Detection for IoT Devices

    Internet of Things (IoT) in military environment for the most part comprises of a different scope of Internet-associated gadgets and hubs (for...
    N. Naveen, Mohammed Asim Safwan, ... N. Nischal in ICDSMLA 2020
    Conference paper 2022
  10. Ensemble Model Ransomware Classification: A Static Analysis-based Approach

    Johnson, Shanoop Gowtham, R. Nair, Anand R.The growth of malware attacks has been phenomenal in the recent past. The COVID-19 pandemic has...
    Shanoop Johnson, R. Gowtham, Anand R. Nair in Inventive Computation and Information Technologies
    Conference paper 2022
  11. Malware Detection Using Machine Learning Approach

    These days, Malware has become a significant andMuppalaneni, Babu develo** warning to safety, identification of malware has become tough. Numerous...
    Conference paper 2021
  12. Malware Detection and Classification Using Ensemble of BiLSTMs with Huffman Feature Optimization

    Context: Malware attacks are responsible for data breaches and financial losses across the globe. Traditional signature-based malware detection...
    Conference paper 2023
  13. Deep Learning for Windows Malware Analysis

    Malwares, such as ransomware, Trojans, spyware, and botnets, are the most common cyber-threats that can cause significant damages for organizations,...
    Mohamed Belaoued, Abdelouahid Derhab, ... Zahia Guessoum in Cyber Malware
    Chapter 2024
  14. Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art

    In the last decade, the number of computer malware has grown rapidly. Currently, cybercriminals typically use malicious software (malware) as a means...

    Sangeeta Rani, Khushboo Tripathi, Ajay Kumar in International Journal on Interactive Design and Manufacturing (IJIDeM)
    Article 25 October 2023
  15. Hybrid Deep Learning Approach Based on LSTM and CNN for Malware Detection

    Malware analysis is essential for detecting and mitigating the effects of malicious software. This study introduces a novel hybrid approach using a...

    Preeti Thakur, Vineet Kansal, Vinay Rishiwal in Wireless Personal Communications
    Article 27 June 2024
  16. Ransomware Detection Service: Execution and Analysis Using Machine Learning Techniques

    Network security faces an escalating threat from hacker attacks due to the proliferation and extensive adoption of computer and internet technology....

    Suriya Badrinath, Roshni Dodhi, Raja Muthalagu in Wireless Personal Communications
    Article 01 November 2023
  17. Generation of Control Flow Graph on Self-Modification Viruses

    A computer virus is a well-known program that has the ability to self-replicate. When executed, a virus can copy itself into other files and perform...
    Conference paper 2024
  18. DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud

    As an emerging virtualization technology, the Linux container provides a more lightweight, flexible, and high-performance operating-system-level...

    Yulong Wang, Qixu Wang, ... Run Yang in Soft Computing
    Article 05 October 2022
  19. On the Detection Limitations of the Re-entrancy Attacks on Ethereum

    In recent years, the emergence of Ethereum has brought people a new way of life. Many users tend to deposit funds into different smart contracts, but...
    Jialu Fu, Wenmao Liu, ... Wenfeng Huang in Computational and Experimental Simulations in Engineering
    Conference paper 2024
  20. Comparative Analysis of Malware Classification Using Supervised Machine Learning Algorithms

    Privacy is a myth, a statement persistently encountered when talking about the world of Internet. Malwares are a constant, ominous threat to data...
    Anisha Mahato, R. T. Goswami, Ambar Dutta in Advances in Data-Driven Computing and Intelligent Systems
    Conference paper 2024
Did you find what you were looking for? Share feedback.