-
41
-
42“…Traditional approaches such as static and dynamic malware identification techniques require a lot of human intervention and resources to design the malware classification model. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
43“…Malware has seriously threatened the safety of computer systems for a long time. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
44“…The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
45“…The widespread usage of mobile devices and their seamless adaptation to each user’s needs through useful applications (apps) makes them a prime target for malware developers. Malware is software built to harm the user, e.g., to access sensitive user data, such as banking details, or to hold data hostage and block user access. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
46por Khalid, Osama, Ullah, Subhan, Ahmad, Tahir, Saeed, Saqib, Alabbad, Dina A., Aslam, Mudassar, Buriro, Attaullah, Ahmad, Rizwan“…In recent years, massive development in the malware industry changed the entire landscape for malware development. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
47“…For efficient malware removal, determination of malware threat levels, and damage estimation, malware family classification plays a critical role. …”
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
48
-
49
-
50
-
51
-
52por Victor, Princy, Lashkari, Arash Habibi, Lu, Rongxing, Sasi, Tinshu, Xiong, Pulei, Iqbal, Shahrear“…However, most present studies lack a deep understanding of IoT malware and its various aspects. As understanding IoT malware is the preliminary base of research, in this work, we present an IoT malware taxonomy with 100 attributes based on the IoT malware categories, attack types, attack surfaces, malware distribution architecture, victim devices, victim device architecture, IoT malware characteristics, access mechanisms, programming languages, and protocols. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
53por Mohd Saudi, Madihah, Husainiamer, Muhammad Afif, Ahmad, Azuan, Idris, Mohd Yamani Idna“…In earlier years, most malware attacks were against Android smartphones. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
54por Yousuf, Muhammad Irfan, Anwer, Izza, Riasat, Ayesha, Zia, Khawaja Tahir, Kim, Suhyun“…In this work, we present a static malware detection system to detect Portable Executable (PE) malware in Windows environment and classify them as benign or malware with high accuracy. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
55“…We outline here the mathematical expression of a diffusion model for cellphones malware transmitted through Bluetooth channels. In particular, we provide the deterministic formula underlying the proposed infection model, in its equivalent recursive (simple but computationally heavy) and closed form (more complex but efficiently computable) expression.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
56“…Malware has become one of the most serious threats to computer information system and the current malware detection technology still has very significant limitations. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
57por Liu, Xiaolei, Du, Xiaojiang, Zhang, Xiaosong, Zhu, Qingxin, Wang, Hao, Guizani, Mohsen“…With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has gradually increased. …”
Publicado 2019
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
58
-
59“…Given the fast evolution of Android malware releases, it is practically not feasible to manually detect malware apps in the Android ecosystem. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
60“…The family homology determination of malware has become a research hotspot as the number of malware variants are on the rise. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto