Cargando…
Detecting Malware with Information Complexity
Malware concealment is the predominant strategy for malware propagation. Black hats create variants of malware based on polymorphism and metamorphism. Malware variants, by definition, share some information. Although the concealment strategy alters this information, there are still patterns on the s...
Autores principales: | Alshahwan, Nadia, Barr, Earl T., Clark, David, Danezis, George, Menéndez, Héctor D. |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7517096/ https://www.ncbi.nlm.nih.gov/pubmed/33286347 http://dx.doi.org/10.3390/e22050575 |
Ejemplares similares
-
Malware detection
por: Nandal, Priyanka
Publicado: (2017) -
A Malware Detection Scheme Based on Mining Format Information
por: Bai, Jinrong, et al.
Publicado: (2014) -
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
por: Mohanta, Abhijit, et al.
Publicado: (2020) -
Malware detection in Android phones
por: Malik, Sapna
Publicado: (2017) -
Method for Detecting Core Malware Sites Related to Biomedical Information Systems
por: Kim, Dohoon, et al.
Publicado: (2015)