We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A comparison of adversarial malware generators

    Machine learning has proven to be a valuable tool for automated malware detection, but machine learning systems have also been shown to be subject to...

    Pavla Louthánová, Matouš Kozák, ... Fabio Di Troia in Journal of Computer Virology and Hacking Techniques
    Article Open access 06 April 2024
  2. Stacking Ensemble-Based Approach for Malware Detection

    The rapid growth of Internet connectivity has resulted in a significant increase in digital attack events, many of which have devastating and severe...

    Shovana Das, Anshika Garg, Sanjay Kumar in SN Computer Science
    Article 10 January 2024
  3. Efficient malware detection through inter-component communication analysis

    With the development of science and technology, the number of smartphones has increased dramatically. This also exposes Android-based smartphones to...

    Peng Chen, Shengwei Tian, ... Hao Zhang in Cluster Computing
    Article 02 June 2024
  4. An Overview of Techniques for Obfuscated Android Malware Detection

    Obfuscation is a method to hide coding strategies for security and privacy. Despite its positive use, malware experts have also used this technique...

    Sidra Siddiqui, Tamim Ahmed Khan in SN Computer Science
    Article 16 March 2024
  5. Classification and online clustering of zero-day malware

    A large amount of new malware is constantly being generated, which must not only be distinguished from benign samples, but also classified into...

    Olha Jurečková, Martin Jureček, ... Róbert Lórencz in Journal of Computer Virology and Hacking Techniques
    Article Open access 12 February 2024
  6. Creating valid adversarial examples of malware

    Because of its world-class results, machine learning (ML) is becoming increasingly popular as a go-to solution for many tasks. As a result, antivirus...

    Matouš Kozák, Martin Jureček, ... Fabio Di Troia in Journal of Computer Virology and Hacking Techniques
    Article Open access 18 March 2024
  7. Framework for understanding intention-unbreakable malware

    The anti-analysis technology of malware has always been the focus in the cyberspace security field. As malware analysis techniques evolve, malware...

    Tiantian Ji, Binxing Fang, ... Shouyou Song in Science China Information Sciences
    Article 27 March 2023
  8. Use of cryptography in malware obfuscation

    Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection....

    Hassan Jameel Asghar, Benjamin Zi Hao Zhao, ... Daniel Coscia in Journal of Computer Virology and Hacking Techniques
    Article 25 September 2023
  9. Zero-Day Malware Classification and Detection Using Machine Learning

    A zero-day vulnerability is a weakness of the computer software and hardware that has yet to be discovered by people who might be interested in...

    Jitendra Kumar, Balaji Rajendran, S. D. Sudarsan in SN Computer Science
    Article 12 December 2023
  10. Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware

    As malware poses a significant threat to IoT devices, the technology to combat IoT malware, like sandbox, has not received enough attention. The...

    Shun Yonamine, Yuzo Taenaka, ... Daisuke Miyamoto in Journal of Computer Virology and Hacking Techniques
    Article 02 May 2023
  11. A comprehensive review on permissions-based Android malware detection

    The first Android-ready “G1” phone debuted in late October 2008. Since then, the growth of Android malware has been explosive, analogous to the rise...

    Yash Sharma, Anshul Arora in International Journal of Information Security
    Article 04 March 2024
  12. MADESANT: malware detection and severity analysis in industrial environments

    Malware remains a persistent threat to industrial operations, causing disruptions and financial losses. Traditional malware detection approaches...

    P. L. S. Jayalaxmi, Manali Chakraborty, ... Mauro Conti in Cluster Computing
    Article Open access 22 May 2024
  13. Malware detection for container runtime based on virtual machine introspection

    The isolation technique of containers introduces uncertain security risks to malware detection in the current container environment. In this paper,...

    **nfeng He, Riyang Li in The Journal of Supercomputing
    Article 06 November 2023
  14. Unmasking the common traits: an ensemble approach for effective malware detection

    Malware detection has become a critical aspect of ensuring the security and integrity of computer systems. With the ever-evolving landscape of...

    Parthajit Borah, Upasana Sarmah, ... J. K. Kalita in International Journal of Information Security
    Article 30 April 2024
  15. A natural language processing approach to Malware classification

    Many different machine learning and deep learning techniques have been successfully employed for malware detection and classification. Examples of...

    Ritik Mehta, Olha Jurečková, Mark Stamp in Journal of Computer Virology and Hacking Techniques
    Article 20 October 2023
  16. iOS mobile malware analysis: a state-of-the-art

    In earlier years, most malware attacks were against Android smartphones. Unfortunately, for the past few years, the trend has shifted towards attacks...

    Madihah Mohd Saudi, Muhammad Afif Husainiamer, ... Mohd Yamani Idna Idris in Journal of Computer Virology and Hacking Techniques
    Article 18 May 2023
  17. Android malware detection using time-aware machine learning approach

    In today’s rapidly evolving digital landscape, the surge in smartphone usage is paralleled by an increasing wave of cyberthreats, highlighting the...

    Anas M. R. AlSobeh, Khalid Gaber, ... Amani Shatnawi in Cluster Computing
    Article 15 June 2024
  18. IPAnalyzer: A novel Android malware detection system using ranked Intents and Permissions

    Android malware has been growing in scale and complexity, spurred by the unabated uptake of smartphones worldwide. Millions of malicious Android...

    Yash Sharma, Anshul Arora in Multimedia Tools and Applications
    Article 01 March 2024
  19. A comparison of graph neural networks for malware classification

    Managing the threat posed by malware requires accurate detection and classification techniques. Traditional detection strategies, such as signature...

    Vrinda Malhotra, Katerina Potika, Mark Stamp in Journal of Computer Virology and Hacking Techniques
    Article 26 July 2023
  20. Enhancing malware detection performance: leveraging K-Nearest Neighbors with Firefly Optimization Algorithm

    Malware detection plays a crucial role in ensuring robust cybersecurity amidst the ever-evolving cyber threats. This research paper delves into the...

    Adeeb Al Saaidah, Mosleh M. Abualhaj, ... Yousef H Alraba’nah in Multimedia Tools and Applications
    Article 21 March 2024
Did you find what you were looking for? Share feedback.