Zobrazeno 1 - 10
of 52
pro vyhledávání: '"Malware research"'
Publikováno v:
ICSSA
Malware obfuscation can make both automatic and manual analysis of its binary code and the contained functionality significantly more time consuming. For malware research it would therefore be useful to be able to study the effects of different obfus
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6984f991dbe4998edec830868e204700
https://phaidra.univie.ac.at/o:1662890
https://phaidra.univie.ac.at/o:1662890
Autor:
Mohd Nizam Mohmad Kahar, Salwana Mohamad, Ahmad Firdaus, Mohd Faizal Ab Razak, Juliza Mohamad Arif, Sharfah Ratibah Tuan Mat
Publikováno v:
Scientometrics
Malware is a blanket term for Trojan, viruses, spyware, worms, and other files that are purposely created to harm computers, mobile devices, or computer networks. Malware commonly steals, encrypts, damages, and causes a mess in these devices. The gro
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 7, Pp 143573-143596 (2019)
In the era of cyberspace, malware is the main weapon for launching cyber-attacks and the critical rival for the security community. More and more researchers are investing in the wave of anti-malware research. In order to promote researchers to enter
Autor:
S Shanthi, S Priyadharshini
Publikováno v:
2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS).
Nowadays, internet connected smart phones devices usage are increasing steadily and also growth of Android application users are increasing. Mobile devices are used in daily activities such as, remote light control, goods and parking payment with the
Autor:
Mohammed Alshehri
Publikováno v:
EAI/Springer Innovations in Communication and Computing ISBN: 9783030691738
Mal Image represents any type of malicious executable (Windows files, APKs) for using image-based features for building classifiers. In recent years, Mal Image-based malware classification is getting attention, which provides a new approach to malwar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8aa6b3e8b43330c6e0a4b1eb8041ff62
https://doi.org/10.1007/978-3-030-69174-5_4
https://doi.org/10.1007/978-3-030-69174-5_4
Autor:
Mark Stamp
Publikováno v:
Malware Analysis Using Artificial Intelligence and Deep Learning ISBN: 9783030625818
In this chapter, we consider neural networks and deep learning, within the context of malware research. A variety of architectures are introduced, including multilayer perceptrons (MLP), convolutional neural networks (CNN), recurrent neural networks
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e89def218c47d6bad9f95714752700ac
https://doi.org/10.1007/978-3-030-62582-5_1
https://doi.org/10.1007/978-3-030-62582-5_1
Publikováno v:
2020 IEEE 4th Conference on Information & Communication Technology (CICT).
With the rapid growth of technology and IT-enabled services, the potential damage caused by malware is increasing rapidly. A large number of detection methods have been proposed to arrest the growth of malware attacks. The performance of these detect
Publikováno v:
Recercat. Dipósit de la Recerca de Catalunya
instname
Repositorio Abierto de la UdL
Universitad de Lleida
instname
Repositorio Abierto de la UdL
Universitad de Lleida
The struggle between security analysts and malware developers is a never-ending battle with the complexity of malware changing as quickly as innovation grows. Current state-of-the-art research focus on the development and application of machine learn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::18097458e2ec895fc39e45c6cf8ffc7c
https://hdl.handle.net/10459.1/68344
https://hdl.handle.net/10459.1/68344
Publikováno v:
Cryptology and Network Security ISBN: 9783030654108
CANS
CANS
Domain Generation Algorithm (DGA) is a popular technique used by many malware developers in recent times. Nowadays, DGA is an evasive technique used by many of the Advanced Persistent Threat (APT) groups and Botnets to bypass host and network-level d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::575f7418acce38c2bf6c28bbf15d7db5
https://doi.org/10.1007/978-3-030-65411-5_7
https://doi.org/10.1007/978-3-030-65411-5_7