[1]
|
Cyber Malware
Security Informatics and Law Enforcement,
2024
DOI:10.1007/978-3-031-34969-0_5
|
|
|
[2]
|
Innovations, Securities, and Case Studies Across Healthcare, Business, and Technology
Advances in Medical Technologies and Clinical Practice,
2024
DOI:10.4018/979-8-3693-1906-2.ch011
|
|
|
[3]
|
Enhanced capsule network‐based executable files malware detection and classification—deep learning approach
Concurrency and Computation: Practice and Experience,
2024
DOI:10.1002/cpe.7928
|
|
|
[4]
|
Information Security Applications
Lecture Notes in Computer Science,
2024
DOI:10.1007/978-981-99-8024-6_15
|
|
|
[5]
|
Harnessing GPT-2 for Feature Extraction in Malware Detection: A Novel Approach to Cybersecurity
Land Forces Academy Review,
2024
DOI:10.2478/raft-2024-0008
|
|
|
[6]
|
Cyber security for federated learning environment using AI technique
Expert Systems,
2023
DOI:10.1111/exsy.13080
|
|
|
[7]
|
Dynamic Analysis of a Malware Sample: Recognizing its Behavior using Forensic Application
2023 4th IEEE Global Conference for Advancement in Technology (GCAT),
2023
DOI:10.1109/GCAT59970.2023.10353478
|
|
|
[8]
|
Android Malware Detection Based on Hypergraph Neural Networks
Applied Sciences,
2023
DOI:10.3390/app132312629
|
|
|
[9]
|
Family Classification based on Tree Representations for Malware
Proceedings of the 14th ACM SIGOPS Asia-Pacific Workshop on Systems,
2023
DOI:10.1145/3609510.3609818
|
|
|
[10]
|
A Comparative Analysis of VirLock and Bacteriophage ϕ6 through the Lens of Game Theory
Analytics,
2023
DOI:10.3390/analytics2040045
|
|
|
[11]
|
A malicious programs detection method incorporating transformer and co-occurrence matrix
Third International Conference on Advanced Algorithms and Signal Image Processing (AASIP 2023),
2023
DOI:10.1117/12.3005851
|
|
|
[12]
|
Comparative Study of Prognosis of Malware with PE Headers Based Machine Leaning Techniques
2023 International Conference on Smart Computing and Application (ICSCA),
2023
DOI:10.1109/ICSCA57840.2023.10087532
|
|
|
[13]
|
Recognition of tor malware and onion services
Journal of Computer Virology and Hacking Techniques,
2023
DOI:10.1007/s11416-023-00476-z
|
|
|
[14]
|
Static malware detection of Ember windows-PE API call using machine learning
COMPUTATIONAL INTELLIGENCE AND NETWORK SECURITY,
2023
DOI:10.1063/5.0130256
|
|
|
[15]
|
HyperIO: A Hypervisor-Based Framework for Secure IO
Applied Sciences,
2023
DOI:10.3390/app13095232
|
|
|
[16]
|
Efficient Windows malware identification and classification scheme for plant protection information systems
Frontiers in Plant Science,
2023
DOI:10.3389/fpls.2023.1123696
|
|
|
[17]
|
DEMD-IoT: a deep ensemble model for IoT malware detection using CNNs and network traffic
Evolving Systems,
2023
DOI:10.1007/s12530-022-09471-z
|
|
|
[18]
|
Success and failure rate prediction of Android Application using Machine Learning
2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON),
2023
DOI:10.1109/OTCON56053.2023.10113988
|
|
|
[19]
|
ANDROIDGYNY: Reviewing clustering techniques for Android malware family classification
Digital Threats: Research and Practice,
2023
DOI:10.1145/3587471
|
|
|
[20]
|
Fast & Furious: On the modelling of malware detection as an evolving data stream
Expert Systems with Applications,
2023
DOI:10.1016/j.eswa.2022.118590
|
|
|
[21]
|
Intelligent Systems Design and Applications
Lecture Notes in Networks and Systems,
2023
DOI:10.1007/978-3-031-35501-1_28
|
|
|
[22]
|
Malware Analysis in Cyber Security based on Deep Learning; Recognition and Classification
2023 IEEE 3rd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA),
2023
DOI:10.1109/MI-STA57575.2023.10169310
|
|
|
[23]
|
International Conference on Innovative Computing and Communications
Lecture Notes in Networks and Systems,
2023
DOI:10.1007/978-981-99-3010-4_4
|
|
|
[24]
|
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC),
2023
DOI:10.1109/COMPSAC57700.2023.00161
|
|
|
[25]
|
Cyber security for federated learning environment using AI technique
Expert Systems,
2023
DOI:10.1111/exsy.13080
|
|
|
[26]
|
The Anatomy of Hardware Reverse Engineering: An Exploration of Human Factors During Problem Solving
ACM Transactions on Computer-Human Interaction,
2023
DOI:10.1145/3577198
|
|
|
[27]
|
Fast & Furious: On the modelling of malware detection as an evolving data stream
Expert Systems with Applications,
2023
DOI:10.1016/j.eswa.2022.118590
|
|
|
[28]
|
Data Management, Analytics and Innovation
Lecture Notes on Data Engineering and Communications Technologies,
2023
DOI:10.1007/978-981-19-2600-6_6
|
|
|
[29]
|
Data Management, Analytics and Innovation
Lecture Notes on Data Engineering and Communications Technologies,
2023
DOI:10.1007/978-981-19-2600-6_6
|
|
|
[30]
|
Deep Learning for Android Malware Defenses: A Systematic Literature Review
ACM Computing Surveys,
2023
DOI:10.1145/3544968
|
|
|
[31]
|
Fast & Furious: On the modelling of malware detection as an evolving data stream
Expert Systems with Applications,
2023
DOI:10.1016/j.eswa.2022.118590
|
|
|
[32]
|
Efficient Windows malware identification and classification scheme for plant protection information systems
Frontiers in Plant Science,
2023
DOI:10.3389/fpls.2023.1123696
|
|
|
[33]
|
A Machine Learning based Malware Classification Framework
2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT),
2023
DOI:10.1109/ICSSIT55814.2023.10060914
|
|
|
[34]
|
Data Management, Analytics and Innovation
Lecture Notes on Data Engineering and Communications Technologies,
2023
DOI:10.1007/978-981-19-2600-6_6
|
|
|
[35]
|
Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review
Security and Communication Networks,
2022
DOI:10.1155/2022/2959222
|
|
|
[36]
|
DEMD-IoT: a deep ensemble model for IoT malware detection using CNNs and network traffic
Evolving Systems,
2022
DOI:10.1007/s12530-022-09471-z
|
|
|
[37]
|
Integrating Comparison of Malware Detection Classification using LGBM and XGB Machine Learning Algorithms
2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS),
2022
DOI:10.1109/ICBDS53701.2022.9935976
|
|
|
[38]
|
A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats
Symmetry,
2022
DOI:10.3390/sym14030549
|
|
|
[39]
|
Usage Patterns and Implementation of Machine Learning for Malware Detection and Predictive Evaluation
2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS),
2022
DOI:10.1109/ICAIS53314.2022.9742840
|
|
|
[40]
|
A New Malware Detection Method Based on VMCADR in Cloud Environments
Security and Communication Networks,
2022
DOI:10.1155/2022/4208066
|
|
|
[41]
|
DGA-based botnets detection using DNS traffic mining
Journal of King Saud University - Computer and Information Sciences,
2022
DOI:10.1016/j.jksuci.2022.03.001
|
|
|
[42]
|
Proceedings of Second International Conference on Advances in Computer Engineering and Communication Systems
Algorithms for Intelligent Systems,
2022
DOI:10.1007/978-981-16-7389-4_28
|
|
|
[43]
|
Embedding vector generation based on function call graph for effective malware detection and classification
Neural Computing and Applications,
2022
DOI:10.1007/s00521-021-06808-8
|
|
|
[44]
|
Advances in Data Computing, Communication and Security
Lecture Notes on Data Engineering and Communications Technologies,
2022
DOI:10.1007/978-981-16-8403-6_54
|
|
|
[45]
|
Advances in Computing and Data Sciences
Communications in Computer and Information Science,
2022
DOI:10.1007/978-3-031-12638-3_13
|
|
|
[46]
|
CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
2022
DOI:10.1109/DSN53405.2022.00028
|
|
|
[47]
|
Software Technologies
Communications in Computer and Information Science,
2022
DOI:10.1007/978-3-031-11513-4_10
|
|
|
[48]
|
PSU-CNN: Prediction of student understanding in the classroom through student facial images using convolutional neural network
Materials Today: Proceedings,
2022
DOI:10.1016/j.matpr.2022.03.691
|
|
|
[49]
|
A Review on Malware Analysis for IoT and Android System
SN Computer Science,
2022
DOI:10.1007/s42979-022-01543-w
|
|
|
[50]
|
Android Malware Risk Evaluation Using Fuzzy Logic
2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC),
2022
DOI:10.1109/PDGC56933.2022.10053179
|
|
|
[51]
|
Machine learning-based malware detection using stacking of opcodes and bytecode sequences
2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC),
2022
DOI:10.1109/PDGC56933.2022.10053307
|
|
|
[52]
|
Building Cybersecurity Ontology for Understanding and Reasoning Adversary Tactics and Techniques
2022 IEEE International Conference on Big Data (Big Data),
2022
DOI:10.1109/BigData55660.2022.10021134
|
|
|
[53]
|
Convergence of Deep Learning and Internet of Things
Advances in Computational Intelligence and Robotics,
2022
DOI:10.4018/978-1-6684-6275-1.ch013
|
|
|
[54]
|
Analysis of Machine learning classifiers for Android Malware Detection
2022 6th International Conference On Computing, Communication, Control And Automation (ICCUBEA,
2022
DOI:10.1109/ICCUBEA54992.2022.10010902
|
|
|
[55]
|
The Anatomy of Hardware Reverse Engineering: An Exploration of Human Factors during Problem Solving
ACM Transactions on Computer-Human Interaction,
2022
DOI:10.1145/3577198
|
|
|
[56]
|
A comparative study of machine learning models for malware detection
2022 19th International Bhurban Conference on Applied Sciences and Technology (IBCAST),
2022
DOI:10.1109/IBCAST54850.2022.9990544
|
|
|
[57]
|
A Review on Malware Analysis for IoT and Android System
SN Computer Science,
2022
DOI:10.1007/s42979-022-01543-w
|
|
|
[58]
|
Cyber security for federated learning environment using AI technique
Expert Systems,
2022
DOI:10.1111/exsy.13080
|
|
|
[59]
|
Science of Cyber Security
Lecture Notes in Computer Science,
2022
DOI:10.1007/978-3-031-17551-0_19
|
|
|
[60]
|
DGA-based botnets detection using DNS traffic mining
Journal of King Saud University - Computer and Information Sciences,
2022
DOI:10.1016/j.jksuci.2022.03.001
|
|
|
[61]
|
Analyzing the Behavioral Artifacts for Malicious Software Detection Using Machine Learning Algorithms
2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N),
2022
DOI:10.1109/ICAC3N56670.2022.10074264
|
|
|
[62]
|
Cyber security for federated learning environment using AI technique
Expert Systems,
2022
DOI:10.1111/exsy.13080
|
|
|
[63]
|
Graph Neural Network-based Android Malware Classification with Jumping Knowledge
2022 IEEE Conference on Dependable and Secure Computing (DSC),
2022
DOI:10.1109/DSC54232.2022.9888878
|
|
|
[64]
|
Analysis of Machine learning classifiers for Android Malware Detection
2022 6th International Conference On Computing, Communication, Control And Automation (ICCUBEA,
2022
DOI:10.1109/ICCUBEA54992.2022.10010902
|
|
|
[65]
|
A comparative study of machine learning models for malware detection
2022 19th International Bhurban Conference on Applied Sciences and Technology (IBCAST),
2022
DOI:10.1109/IBCAST54850.2022.9990544
|
|
|
[66]
|
Android Malware Risk Evaluation Using Fuzzy Logic
2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC),
2022
DOI:10.1109/PDGC56933.2022.10053179
|
|
|
[67]
|
Building Cybersecurity Ontology for Understanding and Reasoning Adversary Tactics and Techniques
2022 IEEE International Conference on Big Data (Big Data),
2022
DOI:10.1109/BigData55660.2022.10021134
|
|
|
[68]
|
Machine learning-based malware detection using stacking of opcodes and bytecode sequences
2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC),
2022
DOI:10.1109/PDGC56933.2022.10053307
|
|
|
[69]
|
TRANSFER LEARNING AND SMOTE ALGORITHM FOR IMAGE-BASED MALWARE CLASSIFICATION
Proceedings of the 4th International Conference on Networking, Information Systems & Security,
2021
DOI:10.1145/3454127.3457631
|
|
|
[70]
|
Toward an Effective Black-Box Adversarial Attack on Functional JavaScript Malware against Commercial Anti-Virus
Proceedings of the 30th ACM International Conference on Information & Knowledge Management,
2021
DOI:10.1145/3459637.3481956
|
|
|
[71]
|
Feature analysis for data-driven APT-related malware discrimination
Computers & Security,
2021
DOI:10.1016/j.cose.2021.102202
|
|
|
[72]
|
MMALE—A Methodology for Malware Analysis in Linux Environments
Computers, Materials & Continua,
2021
DOI:10.32604/cmc.2021.014596
|
|
|
[73]
|
Identifying meaningful clusters in malware data
Expert Systems with Applications,
2021
DOI:10.1016/j.eswa.2021.114971
|
|
|
[74]
|
A Learning-based Static Malware Detection System with Integrated Feature
Intelligent Automation & Soft Computing,
2021
DOI:10.32604/iasc.2021.016933
|
|
|
[75]
|
Feature analysis for data-driven APT-related malware discrimination
Computers & Security,
2021
DOI:10.1016/j.cose.2021.102202
|
|
|
[76]
|
Network and System Security
Lecture Notes in Computer Science,
2021
DOI:10.1007/978-3-030-92708-0_14
|
|
|
[77]
|
Clustering based opcode graph generation for malware variant detection
2021 18th International Conference on Privacy, Security and Trust (PST),
2021
DOI:10.1109/PST52912.2021.9647814
|
|
|
[78]
|
Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses
IEEE Access,
2021
DOI:10.1109/ACCESS.2021.3130495
|
|
|
[79]
|
Fine-grained Classification of Malicious Code Based on CNN and Multi-resolution Feature Fusion
2021 6th International Conference on Computational Intelligence and Applications (ICCIA),
2021
DOI:10.1109/ICCIA52886.2021.00031
|
|
|
[80]
|
Inimitable Approach to Detect & Quarantine Botnet Malware Infections in Network
2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC),
2021
DOI:10.1109/ICSCCC51823.2021.9478117
|
|
|
[81]
|
Comprehensive Review of Malware Detection Techniques
2021 International Conference on Innovative Computing (ICIC),
2021
DOI:10.1109/ICIC53490.2021.9693072
|
|
|
[82]
|
Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
2021
DOI:10.1109/TrustCom53373.2021.00084
|
|
|
[83]
|
AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification
Information Sciences,
2021
DOI:10.1016/j.ins.2020.08.082
|
|
|
[84]
|
Malware Analysis Using Artificial Intelligence and Deep Learning
2021
DOI:10.1007/978-3-030-62582-5_15
|
|
|
[85]
|
Malware Analysis Using Artificial Intelligence and Deep Learning
2021
DOI:10.1007/978-3-030-62582-5_2
|
|
|
[86]
|
Deep Learning and Visualization for Identifying Malware Families
IEEE Transactions on Dependable and Secure Computing,
2021
DOI:10.1109/TDSC.2018.2884928
|
|
|
[87]
|
Multimedia Security
Algorithms for Intelligent Systems,
2021
DOI:10.1007/978-981-15-8711-5_12
|
|
|
[88]
|
Malware homology determination using visualized images and feature fusion
PeerJ Computer Science,
2021
DOI:10.7717/peerj-cs.494
|
|
|
[89]
|
Survey on Prediction of Loan Approval Using Machine Learning Techniques
International Journal of Advanced Research in Science, Communication and Technology,
2021
DOI:10.48175/IJARSCT-1165
|
|
|
[90]
|
Robust Malware Detection using Residual Attention Network
2021 IEEE International Conference on Consumer Electronics (ICCE),
2021
DOI:10.1109/ICCE50685.2021.9427623
|
|
|
[91]
|
Detection and robustness evaluation of android malware classifiers
Journal of Computer Virology and Hacking Techniques,
2021
DOI:10.1007/s11416-021-00390-2
|
|
|
[92]
|
DAEMON: Dataset/Platform-Agnostic Explainable Malware Classification Using Multi-Stage Feature Mining
IEEE Access,
2021
DOI:10.1109/ACCESS.2021.3082173
|
|
|
[93]
|
A Survey on Cross-Architectural IoT Malware Threat Hunting
IEEE Access,
2021
DOI:10.1109/ACCESS.2021.3091427
|
|
|
[94]
|
A Review of Computer Vision Methods in Network Security
IEEE Communications Surveys & Tutorials,
2021
DOI:10.1109/COMST.2021.3086475
|
|
|
[95]
|
Deployable Machine Learning for Security Defense
Communications in Computer and Information Science,
2021
DOI:10.1007/978-3-030-87839-9_6
|
|
|
[96]
|
Information and Communication Technology and Applications
Communications in Computer and Information Science,
2021
DOI:10.1007/978-3-030-69143-1_33
|
|
|
[97]
|
Static Analysis of PE files Using Neural Network Techniques for a Pocket Tool
2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME),
2021
DOI:10.1109/ICECCME52200.2021.9590958
|
|
|
[98]
|
Toward an Effective Black-Box Adversarial Attack on Functional JavaScript Malware against Commercial Anti-Virus
Proceedings of the 30th ACM International Conference on Information & Knowledge Management,
2021
DOI:10.1145/3459637.3481956
|
|
|
[99]
|
Detection of Exceptional Malware Variants Using Deep Boosted Feature Spaces and Machine Learning
Applied Sciences,
2021
DOI:10.3390/app112110464
|
|
|
[100]
|
Identifying meaningful clusters in malware data
Expert Systems with Applications,
2021
DOI:10.1016/j.eswa.2021.114971
|
|
|
[101]
|
An Effective Feature Extraction Mechanism for Intrusion Detection System
IEICE Transactions on Information and Systems,
2021
DOI:10.1587/transinf.2021NGP0007
|
|
|
[102]
|
TRANSFER LEARNING AND SMOTE ALGORITHM FOR IMAGE-BASED MALWARE CLASSIFICATION
The 4th International Conference on Networking, Information Systems amp Security.,
2021
DOI:10.1145/3454127.3457631
|
|
|
[103]
|
Machine learning approach for detection of fileless cryptocurrency mining malware
Journal of Physics: Conference Series,
2020
DOI:10.1088/1742-6596/1450/1/012075
|
|
|
[104]
|
A Framework for Detection of Android Malware using Static Features
2020 IEEE 17th India Council International Conference (INDICON),
2020
DOI:10.1109/INDICON49873.2020.9342511
|
|
|
[105]
|
Malware Analysis using Machine Learning and Deep Learning techniques
2020 SoutheastCon,
2020
DOI:10.1109/SoutheastCon44009.2020.9368268
|
|
|
[106]
|
A Survey on Machine Learning Techniques for Cyber Security in the Last Decade
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.3041951
|
|
|
[107]
|
Android Malware Detection using Chi-Square Feature Selection and Ensemble Learning Method
2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC),
2020
DOI:10.1109/PDGC50313.2020.9315818
|
|
|
[108]
|
A Comparative Analysis of Machine Learning Techniques for Classification and Detection of Malware
2020 21st International Arab Conference on Information Technology (ACIT),
2020
DOI:10.1109/ACIT50332.2020.9300081
|
|
|
[109]
|
Hardware-Assisted MMU Redirection for In-Guest Monitoring and API Profiling
IEEE Transactions on Information Forensics and Security,
2020
DOI:10.1109/TIFS.2020.2969514
|
|
|
[110]
|
Systematic Approach to Malware Analysis (SAMA)
Applied Sciences,
2020
DOI:10.3390/app10041360
|
|
|
[111]
|
Malware classification for the cloud via semi-supervised transfer learning
Journal of Information Security and Applications,
2020
DOI:10.1016/j.jisa.2020.102661
|
|
|
[112]
|
Contextual Identification of Windows Malware through Semantic Interpretation of API Call Sequence
Applied Sciences,
2020
DOI:10.3390/app10217673
|
|
|
[113]
|
Improving Spoofed Website Detection Using Machine Learning
Cybernetics and Systems,
2020
DOI:10.1080/01969722.2020.1826659
|
|
|
[114]
|
A Systematic Literature Review and Quality Analysis of Javascript Malware Detection
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.3031690
|
|
|
[115]
|
Generative Adversarial Network for Global Image-Based Local Image to Improve Malware Classification Using Convolutional Neural Network
Applied Sciences,
2020
DOI:10.3390/app10217585
|
|
|
[116]
|
Realising Honeypot-as-a-Service for Smart Home Solutions
2020 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM),
2020
DOI:10.1109/SEEDA-CECNSM49515.2020.9221787
|
|
|
[117]
|
Android Malware Family Classification and Analysis: Current Status and Future Directions
Electronics,
2020
DOI:10.3390/electronics9060942
|
|
|
[118]
|
The Palgrave Handbook of International Cybercrime and Cyberdeviance
2020
DOI:10.1007/978-3-319-78440-3_35
|
|
|
[119]
|
A Hybrid Deep Learning Model for Malicious Behavior Detection
2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS),
2020
DOI:10.1109/BigDataSecurity-HPSC-IDS49724.2020.00021
|
|
|
[120]
|
CLEMENT: Machine Learning Methods for Malware Recognition Based on Semantic Behaviours
2020 International Conference on Computer Information and Big Data Applications (CIBDA),
2020
DOI:10.1109/CIBDA50819.2020.00059
|
|
|
[121]
|
Internet of Things Forensics HoneyNetCloud Investigation Model
2020 International Conference on Electronics and Sustainable Communication Systems (ICESC),
2020
DOI:10.1109/ICESC48915.2020.9155775
|
|
|
[122]
|
From Image to Code
Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence,
2020
DOI:10.1145/3404555.3404574
|
|
|
[123]
|
A Comprehensive Review on Malware Detection Approaches
IEEE Access,
2020
DOI:10.1109/ACCESS.2019.2963724
|
|
|
[124]
|
No Need to Teach New Tricks to Old Malware: Winning an Evasion Challenge with XOR-based Adversarial Samples
Reversing and Offensive-oriented Trends Symposium,
2020
DOI:10.1145/3433667.3433669
|
|
|
[125]
|
Machine Learning Framework to Analyze IoT Malware Using ELF and Opcode Features
Digital Threats: Research and Practice,
2020
DOI:10.1145/3378448
|
|
|
[126]
|
Dynamic Malware Analysis in the Modern Era—A State of the Art Survey
ACM Computing Surveys,
2020
DOI:10.1145/3329786
|
|
|
[127]
|
Byte-level malware classification based on markov images and deep learning
Computers & Security,
2020
DOI:10.1016/j.cose.2020.101740
|
|
|
[128]
|
A Survey on Mobile Malware Detection Techniques
IEICE Transactions on Information and Systems,
2020
DOI:10.1587/transinf.2019INI0003
|
|
|
[129]
|
Detection of malicious software by analyzing the behavioral artifacts using machine learning algorithms
Information and Software Technology,
2020
DOI:10.1016/j.infsof.2020.106273
|
|
|
[130]
|
FastText-Based Local Feature Visualization Algorithm for Merged Image-Based Malware Classification Framework for Cyber Security and Cyber Defense
Mathematics,
2020
DOI:10.3390/math8030460
|
|
|
[131]
|
Detection of Malicious Vbscript Using Static and Dynamic Analysis with Recurrent Deep Learning
ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
2020
DOI:10.1109/ICASSP40776.2020.9054390
|
|
|
[132]
|
ConvProtoNet: Deep Prototype Induction towards Better Class Representation for Few-Shot Malware Classification
Applied Sciences,
2020
DOI:10.3390/app10082847
|
|
|
[133]
|
Malware Classification Using Simhash Encoding and PCA (MCSP)
Symmetry,
2020
DOI:10.3390/sym12050830
|
|
|
[134]
|
Impact Analysis of Malware Based on Call Network API With Heuristic Detection Method
International Journal of Advances in Data and Information Systems,
2020
DOI:10.25008/ijadis.v1i1.176
|
|
|
[135]
|
Dynamic Malware Analysis in the Modern Era—A State of the Art Survey
ACM Computing Surveys,
2020
DOI:10.1145/3329786
|
|
|
[136]
|
From Image to Code
Proceedings of the 2020 6th International Conference on Computing and Artificial Intelligence,
2020
DOI:10.1145/3404555.3404574
|
|
|
[137]
|
No Need to Teach New Tricks to Old Malware: Winning an Evasion Challenge with XOR-based Adversarial Samples
Reversing and Offensive-oriented Trends Symposium,
2020
DOI:10.1145/3433667.3433669
|
|
|
[138]
|
Machine Learning Framework to Analyze IoT Malware Using ELF and Opcode Features
Digital Threats: Research and Practice,
2020
DOI:10.1145/3378448
|
|
|
[139]
|
Early Detection of Smart Ponzi Scheme Contracts Based on Behavior Forest Similarity
2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS),
2020
DOI:10.1109/QRS51102.2020.00047
|
|
|
[140]
|
Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud
Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services,
2019
DOI:10.1145/3307334.3326083
|
|
|
[141]
|
Malware Detection on Highly Imbalanced Data through Sequence Modeling
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security,
2019
DOI:10.1145/3338501.3357374
|
|
|
[142]
|
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
2019
DOI:10.1145/3319535.3363187
|
|
|
[143]
|
ATMPA
Proceedings of the International Symposium on Quality of Service,
2019
DOI:10.1145/3326285.3329073
|
|
|
[144]
|
A Close Look at a Daily Dataset of Malware Samples
ACM Transactions on Privacy and Security,
2019
DOI:10.1145/3291061
|
|
|
[145]
|
An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants
2019 IEEE Conference on Dependable and Secure Computing (DSC),
2019
DOI:10.1109/DSC47296.2019.8937650
|
|
|
[146]
|
Metamorphic malicious code behavior detection using probabilistic inference methods
Cognitive Systems Research,
2019
DOI:10.1016/j.cogsys.2019.03.007
|
|
|
[147]
|
ATMPA
Proceedings of the International Symposium on Quality of Service,
2019
DOI:10.1145/3326285.3329073
|
|
|
[148]
|
A Survey on Preventing Crypto Ransomware Using Machine Learning
2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT),
2019
DOI:10.1109/ICICICT46008.2019.8993137
|
|
|
[149]
|
Discovering Programmer Intention Behind Written Source Code
2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA),
2019
DOI:10.1109/ICMLA.2019.00081
|
|
|
[150]
|
Discovering Future Malware Variants By Generating New Malware Samples Using Generative Adversarial Network
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE),
2019
DOI:10.1109/ICCKE48569.2019.8964913
|
|
|
[151]
|
Behavioral Entropy Towards Detection of Metamorphic Malwares
2019 9th International Conference on Computer and Knowledge Engineering (ICCKE),
2019
DOI:10.1109/ICCKE48569.2019.8964967
|
|
|
[152]
|
Telematics and Computing
Communications in Computer and Information Science,
2019
DOI:10.1007/978-3-030-33229-7_29
|
|
|
[153]
|
Malware Detection on Highly Imbalanced Data through Sequence Modeling
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security - AISec'19,
2019
DOI:10.1145/3338501.3357374
|
|
|
[154]
|
K-Means Clustering Analysis Based on Adaptive Weights for Malicious Code Detection
2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN),
2019
DOI:10.1109/ICCSN.2019.8905286
|
|
|
[155]
|
Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach
IEEE Access,
2019
DOI:10.1109/ACCESS.2019.2937347
|
|
|
[156]
|
Malware Classification Using Machine Learning Algorithms and Tools
2019 Second International Conference on Advanced Computational and Communication Paradigms (ICACCP),
2019
DOI:10.1109/ICACCP.2019.8882965
|
|
|
[157]
|
A robust and secure backup system for protecting malware
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing - SAC '19,
2019
DOI:10.1145/3297280.3297424
|
|
|
[158]
|
Accelerating convolutional neural network-based malware traffic detection through ant-colony clustering
Journal of Intelligent & Fuzzy Systems,
2019
DOI:10.3233/JIFS-179096
|
|
|
[159]
|
CapJack: Capture In-Browser Crypto-jacking by Deep Capsule Network through Behavioral Analysis
IEEE INFOCOM 2019 - IEEE Conference on Computer Communications,
2019
DOI:10.1109/INFOCOM.2019.8737381
|
|
|
[160]
|
An Efficient Botnet Detection Methodology using Hyper-parameter Optimization Trough Grid-Search Techniques
2019 7th International Workshop on Biometrics and Forensics (IWBF),
2019
DOI:10.1109/IWBF.2019.8739208
|
|
|
[161]
|
The Palgrave Handbook of International Cybercrime and Cyberdeviance
2019
DOI:10.1007/978-3-319-90307-1_35-1
|
|
|
[162]
|
MDBA: Detecting Malware based on Bytes N-Gram with Association Mining
2019 26th International Conference on Telecommunications (ICT),
2019
DOI:10.1109/ICT.2019.8798828
|
|
|
[163]
|
Homology analysis of malware based on ensemble learning and multifeatures
PLOS ONE,
2019
DOI:10.1371/journal.pone.0211373
|
|
|
[164]
|
A Semi-supervised Learning Methodology for Malware Categorization using Weighted Word Embeddings
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW),
2019
DOI:10.1109/EuroSPW.2019.00033
|
|
|
[165]
|
Mimicking Anti-Viruses with Machine Learning and Entropy Profiles
Entropy,
2019
DOI:10.3390/e21050513
|
|
|
[166]
|
Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence
Wireless Personal Communications,
2019
DOI:10.1007/s11277-019-06540-6
|
|
|
[167]
|
Detection of algorithmically generated malicious domain names using masked N-grams
Expert Systems with Applications,
2019
DOI:10.1016/j.eswa.2019.01.050
|
|
|
[168]
|
A Close Look at a Daily Dataset of Malware Samples
ACM Transactions on Privacy and Security,
2019
DOI:10.1145/3291061
|
|
|
[169]
|
Malware Capability Assessment using Fuzzy Logic
Cybernetics and Systems,
2019
DOI:10.1080/01969722.2018.1552906
|
|
|
[170]
|
Metamorphic malicious code behavior detection using probabilistic inference methods
Cognitive Systems Research,
2019
DOI:10.1016/j.cogsys.2019.03.007
|
|
|
[171]
|
Machine Learning-Based Malware Detection using Recurrent Neural Networks
2019 IEEE MIT Undergraduate Research Technology Conference (URTC),
2019
DOI:10.1109/URTC49097.2019.9660435
|
|
|
[172]
|
Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud
Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services,
2019
DOI:10.1145/3307334.3326083
|
|
|
[173]
|
Behavioral-based malware clustering and classification
American Journal of Science & Engineering,
2019
DOI:10.15864/ajse.1105
|
|
|
[174]
|
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
2019
DOI:10.1145/3319535.3363187
|
|
|
[175]
|
Malware classification using byte sequence information
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems,
2018
DOI:10.1145/3264746.3264775
|
|
|
[176]
|
Modeling Malware as a Language
2018 IEEE International Conference on Communications (ICC),
2018
DOI:10.1109/ICC.2018.8422083
|
|
|
[177]
|
MalClassifier: Malware family classification using network flow sequence behaviour
2018 APWG Symposium on Electronic Crime Research (eCrime),
2018
DOI:10.1109/ECRIME.2018.8376209
|
|
|
[178]
|
A Survey on Malware Detection Using Data Mining Techniques
ACM Computing Surveys,
2018
DOI:10.1145/3073559
|
|
|
[179]
|
Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE),
2018
DOI:10.1109/TrustCom/BigDataSE.2018.00224
|
|
|
[180]
|
An Android Malware Detection Technique Using Optimized Permission and API with PCA
2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS),
2018
DOI:10.1109/ICCONS.2018.8662939
|
|
|
[181]
|
The Effect on Network Flows-Based Features and Training Set Size on Malware Detection
2018 IEEE 17th International Symposium on Network Computing and Applications (NCA),
2018
DOI:10.1109/NCA.2018.8548325
|
|
|
[182]
|
ULBP-RF: A Hybrid Approach for Malware Image Classification
2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC),
2018
DOI:10.1109/PDGC.2018.8745989
|
|
|
[183]
|
Methodology for Malware Classification using a Random Forest Classifier
2018 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC),
2018
DOI:10.1109/ROPEC.2018.8661441
|
|
|
[184]
|
DLGraph: Malware Detection Using Deep Learning and Graph Embedding
2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA),
2018
DOI:10.1109/ICMLA.2018.00168
|
|
|
[185]
|
First Line Defense Against Spreading New Malware in the Network
2018 10th Computer Science and Electronic Engineering (CEEC),
2018
DOI:10.1109/CEEC.2018.8674214
|
|
|
[186]
|
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
Computers & Security,
2018
DOI:10.1016/j.cose.2018.01.001
|
|
|
[187]
|
Cyber Security and Threats
2018
DOI:10.4018/978-1-5225-5634-3.ch036
|
|
|
[188]
|
Picking on the family: Disrupting android malware triage by forcing misclassification
Expert Systems with Applications,
2018
DOI:10.1016/j.eswa.2017.11.032
|
|
|
[189]
|
Mining Patterns of Sequential Malicious APIs to Detect Malware
SSRN Electronic Journal ,
2018
DOI:10.2139/ssrn.3247606
|
|
|
[190]
|
Advances on Broad-Band Wireless Computing, Communication and Applications
Lecture Notes on Data Engineering and Communications Technologies,
2018
DOI:10.1007/978-3-319-69811-3_39
|
|
|
[191]
|
The Huawei and Snowden Questions
2018
DOI:10.1007/978-3-319-74950-1_8
|
|
|
[192]
|
Malware classification using byte sequence information
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems,
2018
DOI:10.1145/3264746.3264775
|
|
|
[193]
|
A Survey on Malware Detection Using Data Mining Techniques
ACM Computing Surveys,
2018
DOI:10.1145/3073559
|
|
|
[194]
|
The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics
2017 IEEE Symposium on Visualization for Cyber Security (VizSec),
2017
DOI:10.1109/VIZSEC.2017.8062199
|
|
|
[195]
|
Malware Fingerprinting under Uncertainty
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud),
2017
DOI:10.1109/CSCloud.2017.63
|
|
|
[196]
|
A Framework for Recognition and Confronting of Obfuscated Malwares Based on Memory Dumping and Filter Drivers
Wireless Personal Communications,
2017
DOI:10.1007/s11277-017-4859-y
|
|
|
[197]
|
Applications and Techniques in Information Security
Communications in Computer and Information Science,
2017
DOI:10.1007/978-981-10-5421-1_15
|
|
|
[198]
|
The Rise of Ransomware
Proceedings of the 2017 International Conference on Software and e-Business - ICSEB 2017,
2017
DOI:10.1145/3178212.3178224
|
|
|
[199]
|
Classification of Malware programs using autoencoders based deep learning architecture and its application to the microsoft malware Classification challenge (BIG 2015) dataset
2017 IEEE National Aerospace and Electronics Conference (NAECON),
2017
DOI:10.1109/NAECON.2017.8268747
|
|
|
[200]
|
A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study
International Journal of Information Security,
2017
DOI:10.1007/s10207-016-0342-0
|
|
|
[201]
|
Malware Threat Assessment Using Fuzzy Logic Paradigm
Cybernetics and Systems,
2017
DOI:10.1080/01969722.2016.1262704
|
|
|
[202]
|
Deep Learning Approach to Malware Multi-class Classification Using Image Processing Techniques
2017 International Conference on Computational Science and Computational Intelligence (CSCI),
2017
DOI:10.1109/CSCI.2017.3
|
|
|
[203]
|
A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm
2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD),
2016
DOI:10.1109/FSKD.2016.7603221
|
|
|
[204]
|
Malware Variant Detection Using Opcode Image Recognition with Small Training Sets
2016 25th International Conference on Computer Communication and Networks (ICCCN),
2016
DOI:10.1109/ICCCN.2016.7568542
|
|
|
[205]
|
Feature Selection and Improving Classification Performance for Malware Detection
2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom),
2016
DOI:10.1109/BDCloud-SocialCom-SustainCom.2016.87
|
|
|
[206]
|
Security, Privacy, and Applied Cryptography Engineering
Lecture Notes in Computer Science,
2016
DOI:10.1007/978-3-319-49445-6_15
|
|
|
[207]
|
Towards an effective and efficient malware detection system
2016 IEEE International Conference on Big Data (Big Data),
2016
DOI:10.1109/BigData.2016.7841031
|
|
|
[208]
|
IRMD: Malware Variant Detection Using Opcode Image Recognition
2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS),
2016
DOI:10.1109/ICPADS.2016.0155
|
|
|
[209]
|
A software classification scheme using binary-level characteristics for efficient software filtering
Soft Computing,
2016
DOI:10.1007/s00500-016-2357-x
|
|
|
[210]
|
Identifying malicious activities from system execution traces
IBM Journal of Research and Development,
2016
DOI:10.1147/JRD.2016.2559358
|
|
|
[211]
|
Scalable malware classification with multifaceted content features and threat intelligence
IBM Journal of Research and Development,
2016
DOI:10.1147/JRD.2016.2559378
|
|
|
[212]
|
Automated intelligent multinomial classification of malware species using dynamic behavioural analysis
2016 14th Annual Conference on Privacy, Security and Trust (PST),
2016
DOI:10.1109/PST.2016.7906939
|
|
|
[213]
|
Malware Analysis and Classification Using Sequence Alignments
Intelligent Automation & Soft Computing,
2016
DOI:10.1080/10798587.2015.1118916
|
|
|
[214]
|
Zero-day malware detection
2016 Sixth International Symposium on Embedded Computing and System Design (ISED),
2016
DOI:10.1109/ISED.2016.7977076
|
|
|
[215]
|
A Data Mining Classification Approach for Behavioral Malware Detection
Journal of Computer Networks and Communications,
2016
DOI:10.1155/2016/8069672
|
|
|
[216]
|
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015
Advances in Intelligent Systems and Computing,
2016
DOI:10.1007/978-81-322-2695-6_2
|
|
|
[217]
|
Advanced Computing and Communication Technologies
Advances in Intelligent Systems and Computing,
2016
DOI:10.1007/978-981-10-1023-1_42
|
|
|
[218]
|
Feature Selection and Improving Classification Performance for Malware Detection
2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom),
2016
DOI:10.1109/BDCloud-SocialCom-SustainCom.2016.87
|
|
|
[219]
|
Malicious Behavior Detection using Windows Audit Logs
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security,
2015
DOI:10.1145/2808769.2808773
|
|
|
[220]
|
Intelligent Computing, Communication and Devices
Advances in Intelligent Systems and Computing,
2015
DOI:10.1007/978-81-322-2012-1_26
|
|
|
[221]
|
Intelligent Information and Database Systems
Lecture Notes in Computer Science,
2015
DOI:10.1007/978-3-319-15705-4_19
|
|
|
[222]
|
Milware
Proceedings of the New Security Paradigms Workshop on ZZZ - NSPW '15,
2015
DOI:10.1145/2841113.2841116
|
|
|
[223]
|
Milware: The Implications of State Authored Malicious Software
SSRN Electronic Journal,
2015
DOI:10.2139/ssrn.2569845
|
|
|
[224]
|
Intelligent Computing, Communication and Devices
Advances in Intelligent Systems and Computing,
2015
DOI:10.1007/978-81-322-2012-1_26
|
|
|
[225]
|
Intelligent Information and Database Systems
Lecture Notes in Computer Science,
2015
DOI:10.1007/978-3-319-15705-4_19
|
|
|
[226]
|
Malware analysis and classification using Artificial Neural Network
2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15),
2015
DOI:10.1109/ITACT.2015.7492653
|
|
|
[227]
|
Malicious Behavior Detection using Windows Audit Logs
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security - AISec '15,
2015
DOI:10.1145/2808769.2808773
|
|
|
[228]
|
Spectral malware behavior clustering
2015 IEEE International Conference on Intelligence and Security Informatics (ISI),
2015
DOI:10.1109/ISI.2015.7165931
|
|
|
[229]
|
Quantifying Malware Evolution through Archaeology
Journal of Information Security,
2015
DOI:10.4236/jis.2015.62011
|
|
|
[230]
|
Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes
2015 IEEE Trustcom/BigDataSE/ISPA,
2015
DOI:10.1109/Trustcom.2015.375
|
|
|
[231]
|
VISO: Characterizing Malicious Behaviors of Virtual Machines with Unsupervised Clustering
2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom),
2015
DOI:10.1109/CloudCom.2015.19
|
|
|
[232]
|
Deep neural network based malware detection using two dimensional binary program features
2015 10th International Conference on Malicious and Unwanted Software (MALWARE),
2015
DOI:10.1109/MALWARE.2015.7413680
|
|
|
[233]
|
A study on extraction of optimized API sequence length and combination for efficient malware classification
Journal of the Korea Institute of Information Security and Cryptology,
2014
DOI:10.13089/JKIISC.2014.24.5.897
|
|
|
[234]
|
Agent-based trace learning in a recommendation-verification system for cybersecurity
2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE),
2014
DOI:10.1109/MALWARE.2014.6999404
|
|
|
[235]
|
Malware detection using genetic programming
the 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA),
2014
DOI:10.1109/CISDA.2014.7035623
|
|
|
[236]
|
Integrated Framework for Classification of Malwares
Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14,
2014
DOI:10.1145/2659651.2659738
|
|
|
[237]
|
Classification of PE Files using Static Analysis
Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14,
2014
DOI:10.1145/2659651.2659679
|
|
|