-
101“…This paper presents SmartMal—a novel service-oriented behavioral malware detection framework for vehicular and mobile devices. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
102por Sadek, Ibrahim, Chong, Penny, Rehman, Shafiq Ul, Elovici, Yuval, Binder, Alexander“…The data includes a reference for all running processes as well as a mapping for the designated malware running inside the memory. The datasets are available in the article, for advancing research towards the detection of obfuscated malware from volatile computer memory during a forensic analysis.…”
Publicado 2019
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
103por Yamaguchi, Shingo“…A new kind of malware called Mirai is spreading like wildfire. Mirai is characterized by targeting Internet of Things (IoT) devices. …”
Publicado 2020
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
104“…Malware detection of non-executables has recently been drawing much attention because ordinary users are vulnerable to such malware. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
105“…Due to limited resources, wireless sensor network (WSN) nodes generally possess weak defense capabilities and are often the target of malware attacks. Attackers can capture or infect specific sensor nodes and propagate malware to other sensor nodes in WSNs through node communication. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
106“…How to effectively detect malware is a research trend; in order to tackle the new needs and problems arising from the development of malware, this paper proposes to guide machine learning algorithms to implement malware detection in a distributed environment: firstly, each detection node in the distributed network performs anomaly detection on the captured software information and data, then performs feature analysis to discover unknown malware and obtain its samples, updates the new malware features to all feature detection nodes in the whole distributed network, and trains the random forest-based machine learning algorithm for malware classification and detection, thus completing the global response processing capability for malware. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
107por Albishry, Nabeel, AlGhamdi, Rayed, Almalawi, Abdulmohsen, Khan, Asif Irshad, Kshirsagar, Pravin R., BaruDebtera“…Malware has grown in popularity as a method of conducting cyber assaults in former decades as a result of numerous new deception methods employed by malware. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
108“…With the rapid growth in the number of malware, developing of an efficient and reliable method for classifying malware has become one of the research priorities. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
109“…Traditional signature-based malware detection methods are not adaptable to the current large-scale malware detection. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
110por Asam, Muhammad, Khan, Saddam Hussain, Akbar, Altaf, Bibi, Sameena, Jamal, Tauseef, Khan, Asifullah, Ghafoor, Usman, Bhutta, Muhammad Raheel“…This study addresses the challenge of malware detection in IoT devices by proposing a new CNN-based IoT malware detection architecture (iMDA). …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
111“…Research has spawned in various directions to yield effective malware detection mechanisms. Since malware can adopt different ways to attack and hide, accurate analysis is the key to detecting them. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
112“…The rapid growth of malware has become a serious problem that threatens the security of the mobile ecosystem and needs to be studied and resolved. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
113
-
114“…In this study, the methodology of cyber-resilience in small and medium-sized organizations (SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware analysis, detection and response using open-source solutions is proposed for detecting new emerging threats. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
115“…Also, a method is proposed for the effective detection of malware infection systems triggering IP-spoofed DDoS attacks on an edge network. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
116End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware“…Malware allegedly developed by nation-states, also known as advanced persistent threats (APT), are becoming more common. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
117“…Malware development has seen diversity in terms of architecture and features. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
118“…Notably, most Android malware detection tools depend on conventional machine-learning algorithms; hence, they lose the benefits of metaheuristic optimization. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
119por Alhaidari, Fahd, Shaib, Nouran Abu, Alsafi, Maram, Alharbi, Haneen, Alawami, Majd, Aljindan, Reem, Rahman, Atta-ur, Zagrouba, Rachid“…Owing to the nature of developed Zero-Day malware, distinct evasion tactics are used to remain stealth. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
120“…With the popularity of Android and its open source, the Android platform has become an attractive target for hackers, and the detection and classification of malware has become a research hotspot. Existing malware classification methods rely on complex manual operation or large-volume high-quality training data. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto