-
81“…It is critical to successfully identify, mitigate, and fight against Android malware assaults, since Android malware has long been a significant threat to the security of Android applications. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
82por Riaz, Sharjeel, Latif, Shahzad, Usman, Syed Muhammad, Ullah, Syed Sajid, Algarni, Abeer D., Yasin, Amanullah, Anwar, Aamir, Elmannai, Hela, Hussain, Saddam“…With the increasing capacity of data on IoT devices, these devices are becoming venerable to malware attacks; therefore, malware detection becomes an important issue in IoT devices. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
83“… Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. …”
Enlace del recurso
-
84
-
85“…However, the malware images generated by such schemes have the problem of image size imbalance, which affects the accuracy of malware classification. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
86por Babbar, Himanshi, Rani, Shalli, Sah, Dipak Kumar, AlQahtani, Salman A., Kashif Bashir, Ali“…Predicting attacks in Android malware devices using machine learning for recommender systems-based IoT can be a challenging task. …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
87por Bragança, Hendrio, Rocha, Vanderson, Barcellos, Lucas, Souto, Eduardo, Kreutz, Diego, Feitosa, Eduardo“…This repository of information can serve future research by enabling the analysis of antivirus scan result patterns to discern the prevalence and behaviour of various malware families. Such analysis can help to extend existing malware taxonomies, the identification of novel variants, and the exploration of malware evolution over time.…”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
88“…By comparing the behavior profile of malicious application with representative behavior profile for each malware family using a weighted similarity matching technique, Andro-profiler detects and classifies it into malware families. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
89por Afifi, Firdaus, Anuar, Nor Badrul, Shamshirband, Shahaboddin, Choo, Kim-Kwang Raymond“…To deal with the large number of malicious mobile applications (e.g. mobile malware), a number of malware detection systems have been proposed in the literature. …”
Publicado 2016
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
90“…Malware detection based on API call sequences is widely used for the ability to model program behaviours. …”
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
91por Mat, Sharfah Ratibah Tuan, Ab Razak, Mohd Faizal, Kahar, Mohd Nizam Mohmad, Arif, Juliza Mohamad, Mohamad, Salwana, Firdaus, Ahmad“…Most malware research aims to probe the different methods of preventing, analysing, and detecting malware attacks. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
92por Mohamad Arif, Juliza, Ab Razak, Mohd Faizal, Awang, Suryanti, Tuan Mat, Sharfah Ratibah, Ismail, Nor Syahidatul Nadiah, Firdaus, Ahmad“…The evolution of malware is causing mobile devices to crash with increasing frequency. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
93
-
94Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition“…The most often reported danger to computer security is malware. Antivirus company AV-Test Institute reports that more than 5 million malware samples are created each day. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
95por Arslan, Recep Sinan“…The increasing similarity between Android malware and benign applications makes it difficult to distinguish them from each other and causes a situation of concern for users. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
96“…Nowadays, several malicious applications target computers and mobile users. So, malware detection plays a vital role on the internet so that the device is secure without any malicious activity affecting or gathering the useful content of the user. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
97“…We present a comprehensive empirical analysis of malware detection conducted on recent data (May–June, 2022) from the Koodous platform, which is a collaborative platform where over 70 million Android applications were collected. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
98“…As IoT devices are increasing rapidly, their security must classify malicious software accurately; however, current IoT malware classification methods cannot detect cross-architecture IoT malware using system calls in a particular operating system as the only class of dynamic features. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
99“…Therefore, researchers turn to extracting abundant static features to implement efficient malware detection. In this paper, we explore the direction of capturing malware semantic information by using graph learning algorithms and present BejaGNN (Behavior-based Java malware detection via Graph Neural Network), a novel behavior-based Java malware detection method using static analysis, word embedding technique, and graph neural network. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
100“…To address this problem, in this paper, we propose a multiclass but lightweight malware detection method capable of identifying recent malware and is suitable to execute in embedded devices. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto