Showing 1 - 20 results of 407 for search '"malware"', query time: 0.08s Refine Results
  1. 1

    Effective and Reliable Malware Group Classification for a Massive Malware Environment by Taejin Lee, Jin Kwak

    Published 2016-05-01
    “…As such, anticipative analysis and countermeasures for malware have become more important. Most malware programs are created as variations of existing malware. …”
    Get full text
    Article
  2. 2
  3. 3

    Stateless Malware Packet Detection by Incorporating Naive Bayes with Known Malware Signatures by Ismahani Ismail, Sulaiman Mohd Nor, Muhammad Nadzir Marsono

    Published 2014-01-01
    “…Malware detection done at the network infrastructure level is still an open research problem ,considering the evolution of malwares and high detection accuracy needed to detect these threats. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    An accurate approach to discriminate android colluded malware from single app malware using permissions intelligence by Roger Yiran Mawoh, Joan Beri Ali Wacka, Franklin Tchakounte, Claude Fachkha, Kolyang

    Published 2025-03-01
    “…Existing detection methods primarily focus on single-app malware and hence will misclassify colluding Android apps. …”
    Get full text
    Article
  10. 10

    Study on modern malware analysis system by Yi ZHAO, Jian GONG, Wang YANG

    Published 2014-10-01
    Subjects: “…network security;malware;automated analysis…”
    Get full text
    Article
  11. 11

    Detection and Visualization of Android Malware Behavior by Oscar Somarriba, Urko Zurutuza, Roberto Uribeetxeberria, Laurent Delosières, Simin Nadjm-Tehrani

    Published 2016-01-01
    “…Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. …”
    Get full text
    Article
  12. 12
  13. 13

    Knowledge-infused and Explainable Malware Forensics by Neha Mohan Kumar, Sheikh Rabiul Islam

    Published 2024-05-01
    Subjects: “…malware forensics…”
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17

    GDOM: Granulometry for the Detection of Obfuscated Malware by John A. Aruta, N. Paul Schembari

    Published 2020-01-01
    “…We describe the results of a master's thesis in malware detection and discuss the connection to the learning goals of the project. …”
    Get full text
    Article
  18. 18
  19. 19

    Detecting Malware Based on DNS Graph Mining by Futai Zou, Siyu Zhang, Weixiong Rao, Ping Yi

    Published 2015-10-01
    “…Malware remains a major threat to nowadays Internet. …”
    Get full text
    Article
  20. 20

    Functional modeling of formalization malware implementation tactics by Igor I. Korchagin, Ksenia E. Amelina, Alexander N. Stadnik, Anton O. Karetskiy, Valeriy S. Antonov

    Published 2024-11-01
    “…The tactics performed in this process are described, as well as the malware techniques used. A formalized representation of the multiple structure of the decomposition representation of the target function is given. …”
    Get full text
    Article