Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Malware Analysis and Classification: A Survey"
written by Ekta Gandotra, Divya Bansal, Sanjeev Sofat,
published by Journal of Information Security, Vol.5 No.2, 2014
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Fast & Furious: On the modelling of malware detection as an evolving data stream
Expert Systems with …, 2023
[2] Review on Android Malware Detection System
… Conference on Data Management, Analytics & …, 2023
[3] Graph Neural Network-based Android Malware Classification with Jumping Knowledge
CoRR, 2022
[4] Risk Detection of Android Applications Using Static Permissions
… in Data Computing, Communication and Security, 2022
[5] Leveraging Classification and Detection of Malware: A Robust Machine Learning-Based Framework
Proceedings of Second International Conference on …, 2022
[6] Malware detection and classification in IoT network using ANN
Mehran University Research …, 2022
[7] APMWMM: Approach to Probe Malware on Windows Machine using Machine Learning
… on Applied Artificial …, 2022
[8] Cyber security for federated learning environment using AI technique
Expert Systems, 2022
[9] GNN-based Android Malware Detection with Jumping Knowledge
arXiv preprint arXiv …, 2022
[10] A New Malware Detection Method Based on VMCADR in Cloud Environments
Security and Communication Networks, 2022
[11] : Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach
… on Information and …, 2022
[12] A Novel Neural Network-Based Malware Severity Classification System
International Conference on Software Technologies, 2022
[13] Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review
Security and …, 2022
[14] A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats
Symmetry, 2022
[15] Towards Explainable Quantum Machine Learning for Mobile Malware Detection and Classification
Applied Sciences, 2022
[16] DEMD-IoT: a deep ensemble model for IoT malware detection using CNNs and network traffic
Evolving Systems, 2022
[17] DGA-based botnets detection using DNS traffic mining
Journal of King Saud University …, 2022
[18] Embedding vector generation based on function call graph for effective malware detection and classification
Neural Computing and Applications, 2022
[19] Classification of Web Phishing Kits for early detection by platform providers
arXiv preprint arXiv …, 2022
[20] Malware Classification Based on Semi-Supervised Learning
… Conference on Science …, 2022
[21] CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs
2022 52nd Annual IEEE …, 2022
[22] PROUD-MAL: static analysis-based progressive framework for deep unsupervised malware classification of windows portable executable
Complex & Intelligent …, 2022
[23] DEEPSEL: a novel feature selection for early identification of malware in mobile applications
Future Generation …, 2022
[24] On the Effectiveness of Binary Emulation in Malware Classification
arXiv preprint arXiv:2204.04084, 2022
[25] Malware classification using word embeddings algorithms and long‐short term memory networks
Computational …, 2022
[26] Using static and dynamic malware features to perform malware ascription
ECS Transactions, 2022
[27] PSU-CNN: Prediction of student understanding in the classroom through student facial images using convolutional neural network
Materials Today: Proceedings, 2022
[28] Methods for automatic malware analysis and classification: a survey
International Journal of Information …, 2022
[29] Integrating Comparison of Malware Detection Classification using LGBM and XGB Machine Learning Algorithms
… on Blockchain and …, 2022
[30] Detecting Android Malicious Applications using Dynamic Malware Analysis and Machine Learning
Proceedings of the 2022 Fourteenth …, 2022
[31] Malware Analysis Using Machine Learning Techniques
2022 2nd …, 2022
[32] Empowering Artificial Intelligence for Cybersecurity Applications
2022
[33] Computer and Information Sciences
2022
[34] NeuroYara: Learning to Rank for Yara Rules Generation through Deep Language Modeling & Discriminative N-gram Encoding
2022
[35] Hybrid Malware Detection and Classification in Real-Time by Deep Learning Techniques
2022
[36] Countering Anti-Forensics with Virtualization Technology
2022
[37] XLCNN: pre-trained transformer model for malware detection
2022
[38] Usage Patterns and Implementation of Machine Learning for Malware Detection and Predictive Evaluation
… and Smart Energy …, 2022
[39] Técnicas de aprendizaje automático para la detección de dominios maliciosos generados algorítmicamente
2022
[40] Protection against remote desktop attacks
Production Systems and Information Engineering, 2022
[41] Introducing Quantum Computing in Mobile Malware Detection
Proceedings of the 17th …, 2022
[42] Android Malware Detection Using Hybrid Meta-heuristic Feature Selection and Ensemble Learning Techniques
… Conference on Advances in Computing and Data …, 2022
[43] TagSeq: Malicious behavior discovery using dynamic analysis
Plos one, 2022
[44] Mdfrcnn: Malware detection using faster region proposals convolution neural network
2022
[45] Optimization of code caves in malware binaries to evade machine learning detectors
Computers & Security, 2022
[46] Malware Classification Using Automated Transmutation and CNN
2022
[47] A hybrid streaming analytic model for detection and classification of malware using Artificial Intelligence techniques
… Architectures, Platforms, Use …, 2022
[48] Machine Learning for Static Malware Analysis
Journal: Encyclopedia of Machine Learning and …, 2021
[49] A hybrid approach for android malware detection and family classification
2021
[50] Использование машинного обучения для обнаружения вредоносного трафика
Актуальные проблемы развития …, 2021
[51] Freki: Uma Ferramenta para Análise Automatizada de Malware
Anais Estendidos do XXI Simpósio Brasileiro …, 2021
[52] Comparative Performance Analysis of Anti-virus Software
2021
[53] A Survey on Cross-Architectural IoT Malware Threat Hunting
2021
[54] DAEMON: Dataset/Platform-Agnostic Explainable Malware Classification Using Multi-Stage Feature Mining
2021
[55] A Hybrid Approach for Android Malware Detection and Family Classification.
2021
[56] Malware detection with sequence-based machine learning and deep learning
2021
[57] An Efficient Approach for Phishing Detection using Machine Learning
2021
[58] Android malware detection techniques: a literature review
2021
[59] Robust Malware Detection using Residual Attention Network
2021
[60] Feature analysis for data-driven APT-related malware discrimination
2021
[61] Malware Classification Using Deep Boosted Learning
2021
[62] Inimitable Approach to Detect & Quarantine Botnet Malware Infections in Network
2021
[63] KLASIFIKASI MALWARE BANKING PADA ANDROID MENGGUNAKAN ALGORITMA RANDOM FOREST
2021
[64] Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia
2021
[65] Detection and robustness evaluation of android malware classifiers
2021
[66] Feature Selection on Permissions, Intents and APIs for Android Malware Detection
2021
[67] State of the art: The monero cryptocurrency mining malware detection using supervised machine learning algorithms
2021
[68] MMALE a methodology for malware analysis in linux environments
2021
[69] Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses
IEEE …, 2021
[70] A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges
Future Generation Computer …, 2021
[71] Comprehensive review of malware detection techniques
2021 International …, 2021
[72] Comparative Performance Analysis of Anti-virus Software.
2021
[73] Security Assessment for Tay Services
2021
[74] Detection of exceptional malware variants using deep boosted feature spaces and machine learning
Applied Sciences, 2021
[75] Deep learning for android malware defenses: a systematic literature review
arXiv preprint arXiv:2103.05292, 2021
[76] Image-based malware classification using section distribution information
Computers & Security, 2021
[77] Malicious Behavior Detection Method Using API Sequence in Binary Execution Path.
2021
[78] Cluster Analysis of Malware Family Relationships
2021
[79] Hypervisor-assisted dynamic malware analysis
2021
[80] FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data
2021
[81] HyperPass: Secure Password Input Platform.
2021
[82] Malware homology determination using visualized images and feature fusion
2021
[83] The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack
Avrupa Bilim ve Teknoloji Dergisi, 2021
[84] CSForest: an approach for imbalanced family classification of android malicious applications
2021
[85] Generative adversarial network to detect unseen Internet of Things malware
2021
[86] Hancitor malware recognition using swarm intelligent technique
2021
[87] Malicious Behavior Detection Method Using API Sequence in Binary Execution Path
2021
[88] Ασφάλεια και προστασία ιδιωτικότητας οικιακών συσκευών που λειτουργούν σε περιβάλλον ΔτΠ
2021
[89] Doctorado en Tecnologías de la Información, Comunicaciones y Computación
2021
[90] Racing demons: Malware detection in early execution
2021
[91] A survey paper on malware detection techniques
International Journal, 2021
[92] Advanced methods for android malware detection
2021
[93] Image-based Malware Classification using Deep Convolutional Neural Network and Transfer Learning
2021 3rd International Conference on Advanced …, 2021
[94] Fine-grained Classification of Malicious Code Based on CNN and Multi-resolution Feature Fusion
2021 6th International …, 2021
[95] Malware Detection Using Transformers-based Model GPT-2
2021
[96] How do engineers analyze netlists?: Human problem-solving processes in hardware reverse engineering.
2021
[97] An Effective Feature Extraction Mechanism for Intrusion Detection System
IEICE Transactions on …, 2021
[98] Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs
… Conference on Trust, Security and Privacy …, 2021
[99] Toward an Effective Black-Box Adversarial Attack on Functional JavaScript Malware against Commercial Anti-Virus
Proceedings of the 30th ACM International …, 2021
[100] Static Analysis of PE files Using Neural Network Techniques for a Pocket Tool
2021 International …, 2021
[101] Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study
Journal of Computer Information Systems, 2021
[102] Python and Malware: Developing Stealth and Evasive Malware Without Obfuscation
arXiv preprint arXiv:2105.00565, 2021
[103] A survey on common threats in npm and PyPI registries
… Workshop on Deployable Machine Learning for …, 2021
[104] Collection of the Main Anti-Virus Detection and Bypass Techniques
International Conference on Network …, 2021
[105] Clustering based opcode graph generation for malware variant detection
… Conference on Privacy, Security and Trust …, 2021
[106] Transfer Learning and Smote Algorithm For Image-Based Malware Classification
… of the 4th International Conference on …, 2021
[107] Deep Learning Approach in Malware Hunting
Smart Computing and Self …, 2021
[108] A Survey on Malware Classification Using Machine Learning and Deep Learning
International Journal, 2021
[109] AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification
2021
[110] Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families
2021
[111] Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity
2020
[112] Forenzní analýza v počítačové bezpečnosti
2020
[113] Sécurité par analyse comportementale de fonctions embarquées sur plateformes avioniques modulaires intégrées
2020
[114] Metody statické analýzy malware
2020
[115] Machine Learning (In) Security: A Stream of Problems
2020
[116] Imaging and evaluating the memory access for malware
2020
[117] FastText-Based Local Feature Visualization Algorithm for Merged Image-Based Malware Classification Framework for Cyber Security and Cyber Defense
2020
[118] Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation
2020
[119] Machine Learning Framework to Analyze IoT Malware Using ELF and Opcode Features
2020
[120] Secure Mobile Computing by Using Convolutional and Capsule Deep Neural Networks
2020
[121] Contextual Identification of Windows Malware through Semantic Interpretation of API Call Sequence
2020
[122] LightGBM Algorithm for Malware Detection
2020
[123] A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence
2020
[124] Detection of malicious software by analyzing the behavioral artifacts using machine learning algorithms
2020
[125] CUSTOMER LOAN PREDICTION ANALYSIS
2020
[126] Malware Classification Using Simhash Encoding and PCA (MCSP)
2020
[127] A novel approach for early malware detection
2020
[128] Malware classification for the cloud via semi-supervised transfer learning
2020
[129] A survey on machine learning-based malware detection in executable files
2020
[130] Malware Detection on Virtual Environment Based on Behavioral Anomalies
2020
[131] Internet of Things Forensics HoneyNetCloud Investigation Model
2020
[132] Byte-level malware classification based on markov images and deep learning
2020
[133] A Review on Fileless Malware Analysis Techniques
2020
[134] Malware Classification by Using Deep Learning Framework
2020
[135] DAEMON: Dataset-Agnostic Explainable Malware Classification Using Multi-Stage Feature Mining
2020
[136] A Hybrid Deep Learning Model for Malicious Behavior Detection
2020
[137] A malware variants detection methodology with an opcode-based feature learning method and a fast density-based clustering algorithm
2020
[138] Early Detection of Smart Ponzi Scheme Contracts Based on Behavior Forest Similarity
2020
[139] Machine learning approach for detection of fileless cryptocurrency mining malware
2020
[140] Generative Adversarial Network for Global Image-Based Local Image to Improve Malware Classification Using Convolutional Neural Network
2020
[141] CLEMENT: Machine Learning Methods for Malware Recognition Based on Semantic Behaviours
2020
[142] Malware detection in industrial internet of things based on hybrid image visualization and deep learning model
2020
[143] Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach
2020
[144] Realising Honeypot-as-a-Service for Smart Home Solutions
2020
[145] Detection of Malicious Vbscript Using Static and Dynamic Analysis with Recurrent Deep Learning
2020
[146] Android Malware Family Classification and Analysis: Current Status and Future Directions
2020
[147] Improving Spoofed Website Detection Using Machine Learning
2020
[148] Protocol Deployment for Employing Honeypot-as-a-Service
2020
[149] SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation
2020
[150] Systematic Approach to Malware Analysis (SAMA)
2020
[151] A Review of Computer Vision Methods in Network Security
2020
[152] Malicious Software Threats
2020
[153] From Image to Code: Executable Adversarial Examples of Android Applications
2020
[154] Proposed Framework to Improving Performance of Familial Classification in Android Malware
2020
[155] A Systematic Literature Review and Quality Analysis of Javascript Malware Detection
2020
[156] Adapting to Concept Drift in Malware Detection
2020
[157] Identifying meaningful clusters in malware data
2020
[158] Computer Network Information Security Protection Strategy Based on Clustering Algorithms
2020
[159] ConvProtoNet: Deep Prototype Induction towards Better Class Representation for Few-Shot Malware Classification
2020
[160] GRAMAC: A Graph Based Android Malware Classification Mechanism
2020
[161] Hardware-Assisted MMU Redirection for In-Guest Monitoring and API Profiling
2020
[162] A Deep Learning Approach to Image-Based Malware Analysis
2020
[163] Detection and fine-grained classification of malicious code using convolutional neural networks and swarm intelligence algorithms
2020
[164] A novel method for malware detection on ML-based visualization technique
2020
[165] A comprehensive review on malware detection approaches
2020
[166] Deep learning for image-based mobile malware detection
2020
[167] A survey on mobile malware detection techniques
2020
[168] Efficient algorithm for malware classification: N-gram MCSC
2020
[169] Classification of malware for self-driving systems
2020
[170] Impact Analysis of Malware Based on Call Network API with Heuristic Detection Method
2020
[171] Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection.
ICISSP, 2020
[172] Malware Classification with Gaussian Mixture Model-Hidden Markov Models
2020
[173] Studi Literatur Analisis Malware Menggunakan Metode Analisis Dinamis dan Statis
Jurnal Jaringan Komputer dan Keamanan, 2020
[174] A compensatory approach to anti-virus shortfalls
2020
[175] Nuevos espacios de seguridad nacional: Cómo proteger la información en el ciberespacio
2020
[176] Analisis Karakteristik Malware Joker Berdasarkan Fitur Menggunakan Metode Statik Pada Platform Android
2020
[177] Android Malware Detection using Chi-Square Feature Selection and Ensemble Learning Method
2020
[178] A Solution for Early Detection and Negation of Code and DLL Injection Attacks of Malwares
2020
[179] A Framework for Detection of Android Malware using Static Features
2020
[180] Approaches to Analysing Malware Received from a Reactive Network Telescope
2020
[181] Automated analysis approach for the detection of high survivable ransomware
rimy - KSII Transactions on Internet …, 2020
[182] A Feature-Based Detection System of Adversarial Sample Attack
2020
[183] Explorando o uso de análise estática e aprendizagem supervisionada de máquina para a identificação de códigos maliciosos em arquivos executáveis do sistema …
2020
[184] How Many Phish Can Tweet?
2020
[185] Human enhancement making use of technological incorporations in their biology-Ethical perspective
2020
[186] Loan Approval Prediction System Using Machine Learning
Journal of Innovation in Information Technology, 2020
[187] A Comparative Analysis of Machine Learning Techniques for Classification and Detection of Malware
2020
[188] An In-depth Survey on Malware Detection Techniques
2020
[189] Robust intelligent malware detection using lightgbm algorithm
International Journal of Innovative Technology and Exploring Engineering, 2020
[190] Malware Analysis using Machine Learning and Deep Learning techniques
2020
[191] Malware Threat Analysis of IoT Devices Using Deep Learning Neural Network Methodologies
2020
[192] ESCAPADE: Encryption-type-ransomware: System call based pattern detection
2020
[193] Evaluation to Classify Ransomware Variants based on Correlations between APIs.
2020
[194] A survey on machine learning techniques for cyber security in the last decade
2020
[195] Malware Family Classification Model Using User Defined Features and Representation Learning
2020
[196] No Need to Teach New Tricks to Old Malware: Winning an Evasion Challenge with XOR-based Adversarial Samples
2020
[197] Detection of Anomalous In-Memory Process based on DLL Sequence
International Journal of Advanced Computer Science and Applications, 2020
[198] Weighted N-gram MCSC
2020
[199] Methodology for Malware Scripting Analysis in Controlled Environments Based on Open Source Tools
2019
[200] An Automated Tool for Malware Analysis and Classification
2019
[201] Malware Classification Using Machine Learning and Portable Executable Features
2019
[202] Dynamic API call sequence visualisation for malware classification
2019
[203] Optimal remote access Trojans detection based on network behavior.
2019
[204] Machine Learning-Based Malware Detection using Recurrent Neural Networks
Castrillo, NB Agostini… - 2019 IEEE MIT …, 2019
[205] AN ENSEMBLE-BASED ANOMALY-BEHAVIOURAL CRYPTO-RANSOMWARE PRE-ENCRYPTION DETECTION MODEL
2019
[206] Identifying Ransomware-Specific Properties using Static Analysis of Executables
IJARCCE, 2019
[207] 车联网安全综述
… of Cyber Security 信息安全学报, 2019
[208] Minicursos do XIX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais
2019
[209] Aprendizado de Máquina para Segurança: Algoritmos e Aplicações
Sociedade Brasileira de …, 2019
[210] Multimodal approach for malware detection
2019
[211] Hiding a fault enabled virus through code construction
2019
[212] Malware Classification Using Machine Learning Algorithms and Tools
2019
[213] Learning Malware Representation based on Execution Sequences
2019
[214] Permission based Android Malicious Application Detection using Machine Learning
2019
[215] Security Operations & Incident Management Knowledge Area Issue.
2019
[216] Survey of machine learning techniques for malware analysis
2019
[217] Intelligent Behavior-based Ransomware Detection System for Android Platform
2019
[218] Malware Detection on Highly Imbalanced Data through Sequence Modeling
2019
[219] Dampak Malware Berdasarkan Api Call Network Dengan Metode Heuristic Detection
2019
[220] 恶意代码演化与溯源技术研究
2019
[221] Теорія та практика створення розподілених систем виявлення зловмисного програмного забезпечення в локальних комп'ютерних мережах
2019
[222] Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique
2019
[223] An Ensemble-Based Malware Detection Model Using Minimum Feature Set
2019
[224] K-Means Clustering Analysis Based on Adaptive Weights for Malicious Code Detection
2019
[225] Intelligent Windows Malware Type Detection based on Multiple Sources of Dynamic Characteristics
2019
[226] Analisis Malware Berdasarkan Api Call Memory Dengan Metode Deteksi Signature-based
2019
[227] Behavioral Malware Detection Using Deep Graph Convolutional Neural Networks
2019
[228] Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts
2019
[229] Homology analysis of malware based on ensemble learning and multifeatures
2019
[230] Metamorphic malicious code behavior detection using probabilistic inference methods
2019
[231] ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples
2019
[232] An Improved Method for Packed Malware Detection using PE Header and Section Table Information
2019
[233] Intelligent Malware Detection Using File-to-file Relations and Enhancing its Security against Adversarial Attacks
2019
[234] ScriptNet: Neural Static Analysis for Malicious JavaScript Detection
2019
[235] Comparative Analysis of Ensemble Methods for Classification of Android Malicious Applications
2019
[236] Revisão Sistemática da Literatura das Técnicas baseadas em Texturas para Classificação de Malware
2019
[237] Building a Scalable Simulation Platform for Prototyping Distributed Machine Learning Solutions
2019
[238] Tietoverkkouhat ja niiltä suojautuminen yritysverkossa
2019
[239] 18 Displacing big data
2019
[240] Malware attack and Malware Analysis: A Research
2019
[241] Mimicking Anti-Viruses with Machine Learning and Entropy Profiles
2019
[242] Dynamic Malware Analysis in the Modern Era—A State of the Art Survey
2019
[243] Current State and Modeling of Research Topics in Cybersecurity and Data Science
SYSTEMICS, CYBERNETICS AND INFORMATICS, 2019
[244] Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud
2019
[245] AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
International Journal of Scientific Research and Review, 2019
[246] Application of subspace clustering to scalable malware clustering
2019
[247] A Semi-supervised Learning Methodology for Malware Categorization using Weighted Word Embeddings
2019
[248] MDBA: Detecting Malware based on Bytes N-Gram with Association Mining
2019
[249] A robust and secure backup system for protecting malware
2019
[250] Optimal remote access trojans detection based on network behavior
2019
[251] Similarity-based Intelligent Malware Type Detection through Multiple Sources of Dynamic Characteristics
2019
[252] Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural Network
2019
[253] Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach
2019
[254] Investigating IoT malware characteristics to improve network security
2019
[255] Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence
2019
[256] Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation
2019
[257] CapJack: Capture In-Browser Crypto-jacking by Deep Capsule Network through Behavioral Analysis
2019
[258] Generalized Learning Models for Structured Data
2019
[259] An Efficient Botnet Detection Methodology using Hyper-parameter Optimization Trough Grid-Search Techniques
2019
[260] Discovering Future Malware Variants By Generating New Malware Samples Using Generative Adversarial Network
2019
[261] A Survey on Preventing Crypto Ransomware Using Machine Learning
2019
[262] An Intelligent Behavior-Based Ransomware Detection System For Android Platform
2019
[263] Effective Malicious Features Extraction and Classification for Incident Handling Systems
2019
[264] A contempory Taxonomy of Banking Malware
2019
[265] Applications of data analytics and machine learning tools to the enhanced design of modern communication networks and security applications
2019
[266] Discovering Programmer Intention Behind Written Source Code
2019
[267] Network Behavioral Analysis for Detection of Remote Access Trojans
2019
[268] Malware detection in security operation centres
2019
[269] A Digital Forensic Readiness Approach for Ransomware Forensics
2019
[270] Malwares: Creation and Avoidance
2019
[271] Behavioral Entropy Towards Detection of Metamorphic Malwares
2019
[272] Behavioral-based malware clustering and classification
2019
[273] DEEP LEARNING FOR MALWARE DETECTION IN NETWORK TRAFFIC
2019
[274] Embedding Advanced Persistent Threat in Steganographic Images
2019
[275] An Improved Method for Packed Malware Detection using PE Header and Section Table Information.
2019
[276] Detection of Algorithmically Generated Malicious Domain Names using Masked N-Grams
2019
[277] Mal-Flux: Rendering hidden code of packed binary executable
2019
[278] A Close Look at a Daily Dataset of Malware Samples
2019
[279] Malware Capability Assessment using Fuzzy Logic
2019
[280] Detecting indicators of deception in emulated monitoring systems
2019
[281] Malicious code detection based on CNNs and multi-objective algorithm
2019
[282] Malware intelligence: beyond malware analysis
2019
[283] Accelerating convolutional neural network-based malware traffic detection through ant-colony clustering
Journal of Intelligent & Fuzzy Systems, 2019
[284] Byte Label Malware Classification Using Image Entropy
2019
[285] 程序逆向分析在软件供应链污染检测中的应用
2019
[286] Classi cation and static detection of obfuscated web application backdoors
2018
[287] Automatic Malware Signature Generation
2018
[288] Challenges of Malware Analysis: Obfuscation Techniques
2018
[289] Malware Detection: An Investigation Into the Deployment ofArtificial Intelligence for Antimalware Solutions
2018
[290] DLGraph: Malware Detection Using Deep Learning and Graph Embedding
2018
[291] Dynamic API call Sequence Visualization for Malware classification
2018
[292] Methodology for Malware Classification using a Random Forest Classifier
2018
[293] Malware-Detection Model Using Learning-Based Discovery of Static Features
2018
[294] Analisis Klasterisasi Malware: Evaluasi Data Training Dalam Proses Klasifikasi Malware
2018
[295] The Effect on Network Flows-Based Features and Training Set Size on Malware Detection
2018
[296] DeepMal4J: Java Malware Detection Employing Deep Learning
2018
[297] Deep Learning and Visualization for Identifying Malware Families
2018
[298] Large scale machine learning for the detection and classification of malware
2018
[299] Malware identification using visualization images and deep learning
Computers & Security, 2018
[300] MalClassifier: Malware family classification using network flow sequence behaviour
2018
[301] Need for Speed: Analysis of Brazilian Malware Classifiers' Expiration Date
Thesis, 2018
[302] Feature Engineering for Machine Learning and Data Analytics
Feature Engineering for Machine Learning and Data Analytics, 2018
[303] Критерії класифікації методів виявлення шкідливого програмного забезпечення
2018
[304] KOSIGN: 정보보호제품 관점의 사이버위협정보 공유 체계
REVIEW OF KIISC, 2018
[305] Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
Computers & Security, 2018
[306] Can Ternary Computing Improve Information Assurance?
Cryptography, 2018
[307] Analisis dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis dan Malware Analisis Statis
2018
[308] Clustering Morphed Malware using Opcode Sequence Pattern Matching
Recent Patents on Engineering, 2018
[309] Preliminaries and overview
2018
[310] MALWARE DETECTION AND CLASSIFICATION USING MACHINE LEARNING TECHNIQUES
2018
[311] Dynamic Detection Methods
The Huawei and Snowden Questions, 2018
[312] Evaluation of Cisco's Virtual Internet Routing Lab (VIRL) as a Cyber Security Research Tool
2018
[313] Adversarial Examples: Attacks on Machine Learning-based Malware Visualization Detection Methods
2018
[314] Evaluation and Design of Robust Neural Network Defenses
2018
[315] Adaptive flow abnormity identification based on information entropy
Concurrency and computation: practice and experience, 2018
[316] Deep learning at the shallow end: Malware classification for non-domain experts
Digital Investigation, 2018
[317] 가중치 그래프 변환을 통한 네트워크 행위 추상화 기반의 랜섬웨어 분류 모델 제안
Korea Computer Congress 2018, 2018
[318] Zloraba kombinacije obratnega inženirstva, prikrivanja, ukan in varnostnih ranljivosti
2018
[319] Multinomial malware classification via low-level features
Digital Investigation, 2018
[320] Modeling Malware as a Language
2018
[321] The Rough Set Analysis for Malicious Web Campaigns Identification
Image Processing and Communications Challenges 10, 2018
[322] Deep Learning in Information Security
2018
[323] 사이버 위협 정보의 공유 활성화 방안
The Journal of The Korean Institute of Communication Sciences, 2018
[324] Challenge of Malware Analysis: Malware obfuscation Techniques
2018
[325] Malware classification using byte sequence information
RACS 2018 Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018
[326] A Survey on Malware Analysis Techniques: Static, Dynamic, Hybrid and Memory Analysis
2018
[327] Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning
2018
[328] MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
International Journal of Network Security & Its Applications, 2018
[329] Using convolutional neural networks for classification of malware represented as images
Journal of Computer Virology and Hacking Techniques, 2018
[330] Picking on the family: Disrupting android malware triage by forcing misclassification
Expert Systems with Applications, 2018
[331] Malware classification using self organising feature maps and machine activity data
Computers & Security, 2018
[332] A Theoretical Feature-wise Study of Malware Detection Techniques≫
2018
[333] “L'EXTINCTION EST LA RÈGLE, LA SURVIE EST L'EXCEPTION”: REGROUPEMENT DE MALICIELS SELON LEURS COMPORTEMENTS
2018
[334] A Theoretical Feature-wise Study of Malware Detection Techniques
2018
[335] Survey on mobile malware analysis and detection
2018
[336] Oliveira
2018
[337] An Integrated Architecture for IoT Malware Analysis and Detection
2018
[338] First Line Defense Against Spreading New Malware in the Network
2018
[339] ULBP-RF: A Hybrid Approach for Malware Image Classification
2018
[340] Opcode and Gray Scale Techniques for Classification of Malware Binaries
2018
[341] Displacing big data: How criminals cheat the system
2018
[342] MACHINE LEARNING METHODS FOR MALWARE DETECTION AND CLASSIFICATION
2018
[343] 2-Dimension 정적 Feature Set 이 적용된 Convolutional Neural Network 기반의 악성코드 패킹 분석
2018
[344] CLUSTERING MALWARE’S NETWORK BEHAVIOR USING SIMPLE SEQUENTIAL FEATURES
Thesis, 2018
[345] An Android Malware Detection Technique Using Optimized Permission and API with PCA
2018
[346] Feature extraction for enhanced malware detection using genetic algorithm
2018
[347] Are we protected yet? developing a machine learning detection system to combat zero-day malware attacks
2018
[348] Advancing neuro-fuzzy algorithm for automated classification in largescale forensic and cybercrime investigations: adaptive machine learning for big data …
2018
[349] Analysis and improvements of behaviour-based malware detection mechanisms
2018
[350] A malware risk analysis and detection system for mobile devices using permission-based features/Mohd Faizal Ab Razak
2018
[351] Malware Detection: An Investigation Into the Deployment of Artificial Intelligence for Antimalware Solutions
2018
[352] Malware Classification into Families Based on File Contents and Characteristics
2017
[353] Avaliação da Eficácia de Classificadores de Malware ao Longo do Tempo
2017
[354] Hidden-Code Extraction From Packed Malware Using Memory Based Dynamic Analysis
2017
[355] Survey on representation techniques for malware detection system
2017
[356] A semi supervised hybrid protection for network and host based attacks
2017
[357] The effect of code obfuscation on authorship attribution of binary computer files
2017
[358] A Brief Survey on Sandboxing Techniques and It's vulnerabilities
2017
[359] The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics
2017
[360] Low-Complexity Signature-Based Malware Detection for IoT Devices
Applications and Techniques in Information Security, 2017
[361] Feature Engineering for Twitter-based Applications
2017
[362] Feature Selection and Improving Classification Performance for Malware Detection
2017
[363] A Framework for Generating Malware Threat Intelligence
2017
[364] Malware Fingerprinting under Uncertainty
2017
[365] A Survey on Malware Detection Using Data Mining Techniques
ACM Computing Surveys (CSUR), 2017
[366] A Planner for Supporting Countermeasures in Large Scale Cyber Attacks
Complex, Intelligent, and Software Intensive Systems, 2017
[367] A Framework for Recognition and Confronting of Obfuscated Malwares Based on Memory Dumping and Filter Drivers
Wireless Personal Communications, 2017
[368] Pattern Extraction Algorithm for Netflow-Based Botnet Activities Detection
Hindawi Security and Communication Networks, 2017
[369] Supporting knowledge-assisted rule creation in a behavior-based malware analysis prototype
2017
[370] A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction
Advances on Broad-Band Wireless Computing, Communication and Applications, 2017
[371] Survey on the Usage of Machine Learning Techniques for Malware Analysis
2017
[372] Rule Creation in a Knowledge-assisted Visual Analytics Prototype for Malware Analysis
2017
[373] Malware Detection by HTTPS Traffic Analysis
2017
[374] Data Mining Classification Approaches for Malicious Executable File Detection
2017
[375] Investigation into the Risks Facing Mobile Banking: A Case of Commercial Banks in Kenya
2017
[376] Virtual Machine Introspection Based Malware Behavior Profiling and Family Grouping
2017
[377] A Comparative Overview of Malware Analysis across Operating Systems
ProQuest Dissertations Publishing, 2017
[378] Statistical Evaluation of Malware Classification Algorithms
2017
[379] Malware Detection and Analysis
International Journal of Advanced Research in Computer Science, 2017
[380] Predicting SMT solver performance for software verification
2017
[381] Classification of Malware programs using autoencoders based deep learning architecture and its application to the microsoft malware Classification challenge (BIG …
2017
[382] A Cloud-Based Intelligent and Energy Efficient Malware Detection Framework. A Framework for Cloud-Based, Energy Efficient, and Reliable Malware Detection in …
2017
[383] The Rise of Ransomware
ICSEB 2017 Proceedings of the 2017 International Conference on Software and e-Business, 2017
[384] Analisis Malware Botnet Proteus Pendekatan Static dan Dinamic
2017
[385] Deep Learning Approach to Malware Multi-class Classification Using Image Processing Techniques
2017
[386] A cloud-based intelligent and energy efficient malware detection framework: a framework for cloud-based, energy efficient, and reliable malware detection in real-time …
2017
[387] COMPUTER IMPLEMENTED METHOD FOR CLASSIFYING MOBILE APPLICATIONS AND COMPUTER PROGRAMS THEREOF
2016/01/21/
[388] Análisis digital de una infección de malware en sistemas windows
2016
[389] Malware Characterization Using Windows API Call Sequences
Security, Privacy, and Applied Cryptography Engineering, 2016
[390] Automatic malware classification and new malware detection using machine learning
2016
[391] A three-way decision making approach to malware analysis using probabilistic rough sets
Information Sciences, 2016
[392] Introduction to Malware and Malware Analysis: A brief overview
2016
[393] ClusterMal: Automated Malware Analysis with clustering, anomaly detection and classification of existing and new behavioral analysis
2016
[394] A software classification scheme using binary-level characteristics for efficient software filtering
Soft Computing, 2016
[395] Improving the detection accuracy of unknown malware by partitioning the executables in groups
Advanced Computing and Communication Technologies, 2016
[396] Malware Analysis and Classification Using Sequence Alignments
Intelligent Automation & Soft Computing, 2016
[397] An Effective Approach for Classification of Advanced Malware with High Accuracy
International Journal of Security and Its Applications, 2016
[398] MOBİL KÖTÜCÜL YAZILIMLAR VE GÜVENLİK ÇÖZÜMLERİ ÜZERİNE BİR İNCELEME
Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji, 2016
[399] Identifying malicious activities from system execution traces
2016
[400] A Data Mining Classification Approach for Behavioral Malware Detection
Journal of Computer Networks and Communications, 2016
[401] On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications
2016
[402] The rise of “malware”: Bibliometric analysis of malware study
Journal of Network and Computer Applications, 2016
[403] Scalable malware classification with multifaceted content features and threat intelligence
2016
[404] A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study
International Journal of Information Security, 2016
[405] Equitable Machine Learning Algorithms to Probe Over P2P Botnets
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015, 2016
[406] Tools & Techniques for Malware Analysis and Classification.
International Journal of Next-Generation Computing, 2016
[407] A mining approach for detecting unknown malware using N-Gram and SVM
Advances in Natural and Applied Sciences, 2016
[408] Malware Threat Assessment Using Fuzzy Logic Paradigm
Journal of Adhesion Science and Technology, 2016
[409] Malware Variant Detection Using Opcode Image Recognition with Small Training Sets
2016
[410] A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm
2016
[411] Automated intelligent multinomial classification of malware species using dynamic behavioural analysis
2016
[412] IRMD: Malware Variant Detection Using Opcode Image Recognition
2016
[413] Flow-Graph and Markovian Methods for Cyber Security Analysis
International Journal of Enterprise Information Systems (IJEIS), 2016
[414] Convolutional neural networks for malware classification
2016
[415] Pattern Recognition for Computer Security:Discriminative Models for Email Spam Campaign andMalware Detection
2016
[416] A resource management system design for malware behavior detection
2016
[417] Taxonomy of malware detection techniques
2016
[418] Review of Data Mining Techniques for Malicious Detection
2016
[419] Zero-day malware detection
2016
[420] Σύγχρονα εργαλεία, τεχνικές και μεθοδολογίες για τον χαρακτηρισμό κυβερνοεπιθέσεων και κακόβουλου λογισμικού
2016
[421] An android malware detection system based on cloud computing
2016
[422] Analysis of Rank Distance for Malware Classification
Dissertation, University of Cincinnati, 2016
[423] Taxonomy of malware detection techniques: A systematic literature review
2016
[424] An Approach for Malware Detection and Predictive Analysis Using Artificial Neural Networks
2016
[425] Towards an effective and efficient malware detection system
2016
[426] Pattern recognition for computer security: discriminative models for email spam campaign and malware detection
2016
[427] Pattern recognition for computer security
2016
[428] Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
2016
[429] Loan Approval Prediction based on Machine Learning Approach
2016
[430] Review of data mining techniques for malicious detetion
2016
[431] Tools & techniques for malware analysis and classification
… Journal of Next …, 2016
[432] A Study on Selecting Key Opcodes for Malware Classification and Its Usefulness
2015
[433] Online Manuscript Access
2015
[434] Enhanced Analysis of Kippo-honeypot in Cloud
Thesis, 2015
[435] Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes
2015
[436] Détection des rootkits niveau noyau basée sur LTTng
2015
[437] VISO: Characterizing Malicious Behaviors of Virtual Machines with Unsupervised Clustering
2015
[438] Improved Naive Bayes Classifier for Android Malware Classification
2015
[439] Detecting and Classifying Morphed Malwares: A Survey
International Journal of Computer Applications, 2015
[440] A Three-Way Decision Making Approach to Malware Analysis
Rough Sets and Knowledge Technology, 2015
[441] A Novel Approach to Malware Detection using Static Classification
International Journal of Computer Science and Information Security, 2015
[442] 악성코드 분류를 위한 중요 연산부호 선택 및 그 유용성에 관한 연구
정보과학회논문지, 2015
[443] Measuring Malware Evolution
2015
[444] Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features
arXiv preprint arXiv:1508.03096, 2015
[445] Comparative Analysis of Feature Extraction Methods of Malware Detection
International Journal of Computer Applications, 2015
[446] A Dynamic Malware Analysis for Windows Platform-A Survey
Indian Journal of Science and Technology, 2015
[447] Computational Techniques for Predicting Cyber Threats
Intelligent Computing, Communication and Devices. Springer India, 2015
[448] Malicious Behavior Detection using Windows Audit Logs
arXiv preprint arXiv:1506.04200, 2015
[449] Spectral Malware Behavior Clustering
2015
[450] Malware analysis and classification using Artificial Neural Network
2015
[451] Reverse Engineering For Malware Analysis: Dissecting The Novel Banking Trojan ZeusVM
2015
[452] Quantifying Malware Evolution through Archaeology
Journal of Information Security, 2015
[453] Milware: Identification and Implications of State Authored Malicious Software
Proceedings of the 2015 New Security Paradigms Workshop, 2015
[454] روش تشخیص بدافزار مبتنی بر تحلیل ایستای ساختار PE‎
علوم و فناوريهاي پدافند نوین, 2014
[455] 효율적인 악성코드 분류를 위한 최적의 API 시퀀스 길이 및 조합 도출에 관한 연구
정보보호학회논문지, 2014
[456] 以決策樹偵測殭屍網路之研究
2014
[457] Integrated Framework for Classification of Malwares
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
[458] Classification of PE Files using Static Analysis
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
[459] Agent-based trace learning in a recommendation-verification system for cybersecurity
Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on, 2014
[460] A study on extraction of optimized API sequence length and combination for efficient malware classification
2014
[461] 효율적인 악성코드 분류를 위한최적의 API 시퀀스 길이 및 조합 도출에 관한 연구
2014
[462] Survey of Malware Detection Techniques
2007
[463] Attack Patterns on IoT devices using Honey Net Cloud
[464] Büyük Veri Ortamlarında Zararlı Yazılım Tespiti Kapsamında Makine Öğrenmesi Algoritmalarının Performansının İncelenmesi
[465] Topic Modeling of Significant Concepts and Terminologies in Cybersecurity and Data Science and Their Potential Guidance to Seed Future Research Direction
[466] Design and Implementation of a Virtual File System for Hostbased Moving Target Defence in IoT Devices
[467] Classification and static detection of obfuscated web application backdoors
[468] Malware Classification Using Feature Reduction Method and Autoscaling
[469] Security Operations & Incident Management Knowledge Area Version..
[470] Aprendizado de máquina adversário contra Detectores de Malware
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top