-
121“…In the first dataset, Drebin was used for malware applications, and in the second dataset, CICMalDroid 2020 dataset was used for malware applications. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
122“…With the rise in popularity and usage of Android operating systems, malicious applications are targeted by applying innovative ways and techniques. Today, malware becomes intelligent that uses several ways of obfuscation techniques to hide its functionality and evade anti-malware engines. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
123“…Federated-learning-based Android malware classifiers have attracted much attention due to their privacy-preserving and multi-party joint modeling. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
124“…To reduce such threat, many researchers have proposed new methods to detect Android malware. Currently, most malware detection products on the market are based on malware signatures, which have a fast detection speed and normally a low false alarm rate for known malware families. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
125por Xiao, Kaiming, Zhu, Cheng, Xie, Junjie, Zhou, Yun, Zhu, Xianqiang, Zhang, Weiming“…Stealth malware is a representative tool of advanced persistent threat (APT) attacks, which poses an increased threat to cyber-physical systems (CPS) today. …”
Publicado 2020
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
126“…However, existing approaches primarily focus on component reliability and malware propagation, while the robustness and security of cascading failures between the physical domain and the information domain are usually ignored. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
127por Jusoh, Rosmalissa, Firdaus, Ahmad, Anwar, Shahid, Osman, Mohd Zamri, Darmawan, Mohd Faaizie, Ab Razak, Mohd Faizal“…However, unethical authors tend to develop malware in the devices for wealth, fame, or private purposes. …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
128por Gunduz, Hakan“…Malware harms the confidentiality and integrity of the information that causes material and moral damages to institutions or individuals. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
129por Islam, M. S., Ivanov, S., Awan, H., Drohan, J., Balasubramaniam, S., Coffey, L., Kidambi, S., Sri-saan, W.“…Genetic analysis of the sample’s DNA will decode the address that is used by the software Trojan malware to activate and trigger a remote connection. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
130por Ullah, Farhan, Alsirhani, Amjad, Alshahrani, Mohammed Mujib, Alomari, Abdullah, Naeem, Hamad, Shah, Syed Aziz“…This situation needs the immediate implementation of an effective malware detection system. In this study, an explainable malware detection system was proposed using transfer learning and malware visual features. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
131“…Self-propagating malware has been infecting thousands of IoT devices and causing security breaches worldwide. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
132por Hernandez-Suarez, Aldo, Sanchez-Perez, Gabriel, Toscano-Medina, Linda K., Perez-Meana, Hector, Olivares-Mercado, Jesus, Portillo-Portillo, Jose, Benitez-Garcia, Gibran, Sandoval Orozco, Ana Lucila, García Villalba, Luis Javier“…Among the most latent challenges are the detection, classification and eradication of malware and Denial of Service Cyber-Attacks (DoS). …”
Publicado 2023
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
133“…This makes Android smartphones a prime target for malware. In order to address threats posed by malware, many researchers have proposed different malware detection approaches, including using a function call graph (FCG). …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
134por Zheng, Rongfeng, Liu, Jiayong, Liu, Liang, Liao, Shan, Li, Kai, Wei, Jihong, Li, Li, Tian, Zhiyi“…The transport layer security (TLS) protocol is widely adopted by apps as well as malware. With the geometric growth of TLS traffic, accurate and efficient detection of malicious TLS flows is becoming an imperative. …”
Publicado 2020
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
135“…The most critical problem is to detect malware-infected apps and keep them out of Google play store. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
136por Alotaibi, Abdullah Shawan“…Detection of unknown malware and its variants remains both an operational and a research challenge in the Internet of Things (IoT). …”
Publicado 2021
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
137por Rafiq, Husnain, Aslam, Nauman, Aleem, Muhammad, Issac, Biju, Randhawa, Rizwan Hamid“…Due to the widespread usage of Android smartphones in the present era, Android malware has become a grave security concern. The research community relies on publicly available datasets to keep pace with evolving malware. …”
Publicado 2022
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
138
-
139
-
140“…Deep learning methods are being increasingly widely used in static malware detection field because they can summarize the feature of malware and its variants that have never appeared before. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto