-
1
Effective and Reliable Malware Group Classification for a Massive Malware Environment
Published 2016-05-01“…As such, anticipative analysis and countermeasures for malware have become more important. Most malware programs are created as variations of existing malware. …”
Get full text
Article -
2
-
3
Stateless Malware Packet Detection by Incorporating Naive Bayes with Known Malware Signatures
Published 2014-01-01“…Malware detection done at the network infrastructure level is still an open research problem ,considering the evolution of malwares and high detection accuracy needed to detect these threats. …”
Get full text
Article -
4
I-MCM: IoT Malware Counter Measures for Cross-Architecture IoT Malware Detection
Published 2025-01-01Subjects: Get full text
Article -
5
-
6
-
7
Construction of Countably Infinite Programs That Evade Malware/Non-Malware Classification for Any Given Formal System
Published 2025-03-01Subjects: “…malware detection…”
Get full text
Article -
8
Malware-SeqGuard: An Approach Utilizing LSTM and GRU for Effective Detection of Evolving Malware in Android Environments
Published 2025-01-01Subjects: “…Malware-SeqGuard…”
Get full text
Article -
9
An accurate approach to discriminate android colluded malware from single app malware using permissions intelligence
Published 2025-03-01“…Existing detection methods primarily focus on single-app malware and hence will misclassify colluding Android apps. …”
Get full text
Article -
10
Study on modern malware analysis system
Published 2014-10-01Subjects: “…network security;malware;automated analysis…”
Get full text
Article -
11
Detection and Visualization of Android Malware Behavior
Published 2016-01-01“…Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. …”
Get full text
Article -
12
Malware in Computer Systems: Problems and Solutions
Published 2020-11-01Subjects: Get full text
Article -
13
Knowledge-infused and Explainable Malware Forensics
Published 2024-05-01Subjects: “…malware forensics…”
Get full text
Article -
14
-
15
-
16
-
17
GDOM: Granulometry for the Detection of Obfuscated Malware
Published 2020-01-01“…We describe the results of a master's thesis in malware detection and discuss the connection to the learning goals of the project. …”
Get full text
Article -
18
Systematic Review: Malware Detection and Classification in Cybersecurity
Published 2025-07-01Subjects: “…malware…”
Get full text
Article -
19
Detecting Malware Based on DNS Graph Mining
Published 2015-10-01“…Malware remains a major threat to nowadays Internet. …”
Get full text
Article -
20
Functional modeling of formalization malware implementation tactics
Published 2024-11-01“…The tactics performed in this process are described, as well as the malware techniques used. A formalized representation of the multiple structure of the decomposition representation of the target function is given. …”
Get full text
Article