-
21“…The increasing number of Android malware forced antivirus (AV) companies to rely on automated classification techniques to determine the family and class of suspicious samples. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
22“…This paper offers a comprehensive analysis model for android malware. The model presents the essential factors affecting the analysis results of android malware that are vision-based. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
23“…Malware analysis is a powerful investigation technique widely used in various security areas including digital forensics and incident response processes. …”
Enlace del recurso
-
24
-
25
-
26
-
27
-
28
-
29“…One of the proven effective approaches is the adaption of machine learning (ML) concepts and applying different algorithms to detect, identify, and even block the propagation of malware. Hence, this study’s main objectives were to collect tweets from Twitter that are related to the topic of COVID-19 and extract features from these tweets and import them as independent variables for the machine learning models to be developed later, so they would identify imported tweets as to be malicious or not.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
30“…Our experimental results show that the image matrices of malware can effectively be used to classify malware families both statically and dynamically with accuracy of 0.9896 and 0.9732, respectively.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
31“…As the dominator of the Smartphone operating system market, consequently android has attracted the attention of s malware authors and researcher alike. The number of types of android malware is increasing rapidly regardless of the considerable number of proposed malware analysis systems. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
32“…Advanced Persistent Threat is an attack campaign in which an intruder or team of intruders establishes a long-term presence on a network to mine sensitive data, which becomes more dangerous when combined with polymorphic malware. This type of malware is not only undetectable, but it also generates multiple variants of the same type of malware in the network and remains in the system’s main memory to avoid detection. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
33“…This research study mainly focused on the dynamic malware detection. Malware progressively changes, leading to the use of dynamic malware detection techniques in this research study. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
34
-
35por Panda, Pratyush, C U, Om Kumar, Marappan, Suguna, Ma, Suresh, S, Manimurugan, Veesani Nandi, Deeksha“…Various malware detection methods that use shallow or deep IoT techniques were discovered in recent years. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
36“…As more documents appear on the Internet, it becomes important to detect malware within the documents. Malware of non-executables might be more dangerous because people usually open them without worrying about inherent danger. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
37por Shen, Shigen, Huang, Longjun, Liu, Jianhua, Champion, Adam C., Yu, Shui, Cao, Qiying“…Facing the contradiction between malware intention and continuous-time Markov chain (CTMC) randomness, we introduce a strategic game that can predict malware infection in order to model a successful infection as a CTMC state transition. …”
Publicado 2016
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
38“…The aim of this paper is to understand the propagation mechanisms of web malware and the impact of human intervention on the spread of malicious hyperlinks. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
39“…With the exponential increase in malware, homology analysis has become a hot research topic in the malware detection field. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
40