-
61“…This mechanism restricts the correlation between an epidemic’s initial growth rate and its total reach, thus preventing the majority of epidemics, including initially fast-growing outbreaks, from reaching a macroscopic fraction of the population. The few pervasive malwares distinguish themselves early on via the following key trait: they avoid infecting the tail, while preferentially targeting computers unaffected by typical malware.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
62por Pinheiro, Ricardo P., Lima, Sidney M. L., Souza, Danilo M., Silva, Sthéfano H. M. T., Lopes, Petrônio G., de Lima, Rafael D. T., de Oliveira, Jemerson R., Monteiro, Thyago de A., Fernandes, Sérgio M. M., Albuquerque, Edison de Q., Silva, Washington W. A. da, Santos, Wellington P. dos“…Instead of blacklist-based models, our antivirus allows JAR malware detection preventively and not reactively as Oracle’s Java and traditional antivirus modus operandi.…”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
63“…Machine learning with static-analysis features extracted from malware files has been adopted to detect malware variants, which is desirable for resource-constrained edge computing and Internet-of-Things devices with sensors; however, this learned model suffers from a misclassification problem because some malicious files have almost the same static-analysis features as benign ones. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
64“…In this work, we provide a comprehensive evaluation of anti-malware tools to gauge the impact of complex hybrid code-obfuscations techniques on malware detection capabilities of the prominent anti-malware tools. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
65“…With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. …”
Enlace del recurso
-
66
-
67
-
68por Alsubai, Shtwai, Dutta, Ashit Kumar, Alnajim, Abdullah M., Wahab Sait, Abdul rahaman, Ayub, Rashid, AlShehri, Afnan Mushabbab, Ahmad, Naved“…The Internet of Things (IoT) environment demands a malware detection (MD) framework for protecting sensitive data from unauthorized access. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
69por Aboaoja, Faitouri A., Zainal, Anazida, Ghaleb, Fuad A., Alghamdi, Norah Saleh, Saeed, Faisal, Alhuwayji, Husayn“…BACKGROUND: Malware, malicious software, is the major security concern of the digital realm. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
70The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures“…The aim of this paper is to evaluate a static structure approach to malware modelling using the growing malware signature databases now available. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
71“…Our approach uses malicious code crawling to rearrange websites in the order of their risk index by analyzing the centrality between malware sites and proactively eliminates the root of these sites by finding the core-hub node, thereby reducing unnecessary security policies. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
72“…Based on the inherent characteristics of wireless sensor networks (WSN), the dynamic behavior of malware propagation in flat WSN is analyzed and investigated. …”
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
73“…Due to advancements in malware competencies, cyber-attacks have been broadly observed in the digital world. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
74por Hemalatha, Jeyaprakash, Roseline, S. Abijah, Geetha, Subbiah, Kadry, Seifedine, Damaševičius, Robertas“…Despite the incessant efforts of cybersecurity research to defend against malware threats, malware developers discover new ways to evade these defense techniques. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
75
-
76por Wang, Liu, He, Ren, Wang, Haoyu, Xia, Pengcheng, Li, Yuanchun, Wu, Lei, Zhou, Yajin, Luo, Xiapu, Sui, Yulei, Guo, Yao, Xu, Guoai“…Although a few media reports mentioned the existence of coronavirus-themed mobile malware, the research community lacks the understanding of the landscape of the coronavirus-themed mobile malware. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
77“…With the popularity of Android, malware detection and family classification have also become a research focus. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
78“…As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are increasing every year. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
79“…A few studies proposed models for the detection of mobile malware. Nevertheless, improvements are required to achieve maximum efficiency and performance. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
80“…As Android is a popular a mobile operating system, Android malware is on the rise, which poses a great threat to user privacy and security. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto