Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Malware Analysis and Classification: A Survey"
written by Ekta Gandotra, Divya Bansal, Sanjeev Sofat,
published by Journal of Information Security, Vol.5 No.2, 2014
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Malware Classification Using Automated Transmutation and CNN
2022
[2] Comparative Performance Analysis of Anti-virus Software
2021
[3] DAEMON: Dataset/Platform-Agnostic Explainable Malware Classification Using Multi-Stage Feature Mining
2021
[4] An Efficient Approach for Phishing Detection using Machine Learning
2021
[5] Android malware detection techniques: a literature review
2021
[6] A Survey on Cross-Architectural IoT Malware Threat Hunting
2021
[7] A Hybrid Approach for Android Malware Detection and Family Classification.
2021
[8] Malware detection with sequence-based machine learning and deep learning
2021
[9] Robust Malware Detection using Residual Attention Network
2021
[10] Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia
2021
[11] Feature analysis for data-driven APT-related malware discrimination
2021
[12] Malware Classification Using Deep Boosted Learning
2021
[13] Inimitable Approach to Detect & Quarantine Botnet Malware Infections in Network
2021
[14] KLASIFIKASI MALWARE BANKING PADA ANDROID MENGGUNAKAN ALGORITMA RANDOM FOREST
2021
[15] Detection and robustness evaluation of android malware classifiers
2021
[16] CSForest: an approach for imbalanced family classification of android malicious applications
2021
[17] Feature Selection on Permissions, Intents and APIs for Android Malware Detection
2021
[18] Malicious Behavior Detection Method Using API Sequence in Binary Execution Path.
2021
[19] Cluster Analysis of Malware Family Relationships
2021
[20] Hypervisor-assisted dynamic malware analysis
2021
[21] FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data
2021
[22] HyperPass: Secure Password Input Platform.
2021
[23] Malware homology determination using visualized images and feature fusion
2021
[24] Generative adversarial network to detect unseen Internet of Things malware
2021
[25] Hancitor malware recognition using swarm intelligent technique
2021
[26] Comparative Performance Analysis of Anti-virus Software.
2021
[27] Security Assessment for Tay Services
2021
[28] Malicious Behavior Detection Method Using API Sequence in Binary Execution Path
2021
[29] AI-HydRa: Advanced hybrid approach using random forest and deep learning for malware classification
2021
[30] Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families
2021
[31] Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity
2020
[32] Forenzní analýza v počítačové bezpečnosti
2020
[33] Sécurité par analyse comportementale de fonctions embarquées sur plateformes avioniques modulaires intégrées
2020
[34] Metody statické analýzy malware
2020
[35] Machine Learning (In) Security: A Stream of Problems
2020
[36] Imaging and evaluating the memory access for malware
2020
[37] FastText-Based Local Feature Visualization Algorithm for Merged Image-Based Malware Classification Framework for Cyber Security and Cyber Defense
2020
[38] Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation
2020
[39] Machine Learning Framework to Analyze IoT Malware Using ELF and Opcode Features
2020
[40] Secure Mobile Computing by Using Convolutional and Capsule Deep Neural Networks
2020
[41] Contextual Identification of Windows Malware through Semantic Interpretation of API Call Sequence
2020
[42] LightGBM Algorithm for Malware Detection
2020
[43] A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence
2020
[44] Detection of malicious software by analyzing the behavioral artifacts using machine learning algorithms
2020
[45] CUSTOMER LOAN PREDICTION ANALYSIS
2020
[46] Malware Classification Using Simhash Encoding and PCA (MCSP)
2020
[47] A novel approach for early malware detection
2020
[48] Malware classification for the cloud via semi-supervised transfer learning
2020
[49] A survey on machine learning-based malware detection in executable files
2020
[50] Malware Detection on Virtual Environment Based on Behavioral Anomalies
2020
[51] Internet of Things Forensics HoneyNetCloud Investigation Model
2020
[52] Byte-level malware classification based on markov images and deep learning
2020
[53] A Review on Fileless Malware Analysis Techniques
2020
[54] Malware Classification by Using Deep Learning Framework
2020
[55] DAEMON: Dataset-Agnostic Explainable Malware Classification Using Multi-Stage Feature Mining
2020
[56] A Hybrid Deep Learning Model for Malicious Behavior Detection
2020
[57] A malware variants detection methodology with an opcode-based feature learning method and a fast density-based clustering algorithm
2020
[58] Early Detection of Smart Ponzi Scheme Contracts Based on Behavior Forest Similarity
2020
[59] Machine learning approach for detection of fileless cryptocurrency mining malware
2020
[60] Generative Adversarial Network for Global Image-Based Local Image to Improve Malware Classification Using Convolutional Neural Network
2020
[61] CLEMENT: Machine Learning Methods for Malware Recognition Based on Semantic Behaviours
2020
[62] Malware detection in industrial internet of things based on hybrid image visualization and deep learning model
2020
[63] Malware Elimination Impact on Dynamic Analysis: An Experimental Machine Learning Approach
2020
[64] Realising Honeypot-as-a-Service for Smart Home Solutions
2020
[65] Detection of Malicious Vbscript Using Static and Dynamic Analysis with Recurrent Deep Learning
2020
[66] Android Malware Family Classification and Analysis: Current Status and Future Directions
2020
[67] Improving Spoofed Website Detection Using Machine Learning
2020
[68] Protocol Deployment for Employing Honeypot-as-a-Service
2020
[69] SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation
2020
[70] Systematic Approach to Malware Analysis (SAMA)
2020
[71] A Review of Computer Vision Methods in Network Security
2020
[72] Malicious Software Threats
2020
[73] From Image to Code: Executable Adversarial Examples of Android Applications
2020
[74] Proposed Framework to Improving Performance of Familial Classification in Android Malware
2020
[75] A Systematic Literature Review and Quality Analysis of Javascript Malware Detection
2020
[76] Adapting to Concept Drift in Malware Detection
2020
[77] Identifying meaningful clusters in malware data
2020
[78] Computer Network Information Security Protection Strategy Based on Clustering Algorithms
2020
[79] ConvProtoNet: Deep Prototype Induction towards Better Class Representation for Few-Shot Malware Classification
2020
[80] GRAMAC: A Graph Based Android Malware Classification Mechanism
2020
[81] Hardware-Assisted MMU Redirection for In-Guest Monitoring and API Profiling
2020
[82] A Deep Learning Approach to Image-Based Malware Analysis
2020
[83] Detection and fine-grained classification of malicious code using convolutional neural networks and swarm intelligence algorithms
2020
[84] A novel method for malware detection on ML-based visualization technique
2020
[85] A comprehensive review on malware detection approaches
2020
[86] Deep learning for image-based mobile malware detection
2020
[87] A survey on mobile malware detection techniques
2020
[88] Efficient algorithm for malware classification: N-gram MCSC
2020
[89] Classification of malware for self-driving systems
2020
[90] Impact Analysis of Malware Based on Call Network API with Heuristic Detection Method
2020
[91] Nuevos espacios de seguridad nacional: Cómo proteger la información en el ciberespacio
2020
[92] Analisis Karakteristik Malware Joker Berdasarkan Fitur Menggunakan Metode Statik Pada Platform Android
2020
[93] Android Malware Detection using Chi-Square Feature Selection and Ensemble Learning Method
2020
[94] A Comparative Analysis of Machine Learning Techniques for Classification and Detection of Malware
2020
[95] Explorando o uso de análise estática e aprendizagem supervisionada de máquina para a identificação de códigos maliciosos em arquivos executáveis do sistema …
2020
[96] A Solution for Early Detection and Negation of Code and DLL Injection Attacks of Malwares
2020
[97] A Framework for Detection of Android Malware using Static Features
2020
[98] How Many Phish Can Tweet?
2020
[99] Human enhancement making use of technological incorporations in their biology-Ethical perspective
2020
[100] An In-depth Survey on Malware Detection Techniques
2020
[101] A Feature-Based Detection System of Adversarial Sample Attack
2020
[102] Malware Analysis using Machine Learning and Deep Learning techniques
2020
[103] Malware Threat Analysis of IoT Devices Using Deep Learning Neural Network Methodologies
2020
[104] ESCAPADE: Encryption-type-ransomware: System call based pattern detection
2020
[105] Evaluation to Classify Ransomware Variants based on Correlations between APIs.
2020
[106] Malware Family Classification Model Using User Defined Features and Representation Learning
2020
[107] No Need to Teach New Tricks to Old Malware: Winning an Evasion Challenge with XOR-based Adversarial Samples
2020
[108] Weighted N-gram MCSC
2020
[109] A survey on machine learning techniques for cyber security in the last decade
2020
[110] Dynamic API call sequence visualisation for malware classification
2019
[111] Optimal remote access Trojans detection based on network behavior.
2019
[112] Methodology for Malware Scripting Analysis in Controlled Environments Based on Open Source Tools
2019
[113] An Automated Tool for Malware Analysis and Classification
2019
[114] Malware Classification Using Machine Learning and Portable Executable Features
2019
[115] Multimodal approach for malware detection
2019
[116] Hiding a fault enabled virus through code construction
2019
[117] Malware Classification Using Machine Learning Algorithms and Tools
2019
[118] Learning Malware Representation based on Execution Sequences
2019
[119] Permission based Android Malicious Application Detection using Machine Learning
2019
[120] Security Operations & Incident Management Knowledge Area Issue.
2019
[121] Survey of machine learning techniques for malware analysis
2019
[122] Intelligent Behavior-based Ransomware Detection System for Android Platform
2019
[123] Malware Detection on Highly Imbalanced Data through Sequence Modeling
2019
[124] Dampak Malware Berdasarkan Api Call Network Dengan Metode Heuristic Detection
2019
[125] 恶意代码演化与溯源技术研究
2019
[126] Теорія та практика створення розподілених систем виявлення зловмисного програмного забезпечення в локальних комп'ютерних мережах
2019
[127] Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique
2019
[128] An Ensemble-Based Malware Detection Model Using Minimum Feature Set
2019
[129] K-Means Clustering Analysis Based on Adaptive Weights for Malicious Code Detection
2019
[130] Intelligent Windows Malware Type Detection based on Multiple Sources of Dynamic Characteristics
2019
[131] Analisis Malware Berdasarkan Api Call Memory Dengan Metode Deteksi Signature-based
2019
[132] Behavioral Malware Detection Using Deep Graph Convolutional Neural Networks
2019
[133] Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts
2019
[134] Homology analysis of malware based on ensemble learning and multifeatures
2019
[135] Metamorphic malicious code behavior detection using probabilistic inference methods
2019
[136] ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples
2019
[137] An Improved Method for Packed Malware Detection using PE Header and Section Table Information
2019
[138] Intelligent Malware Detection Using File-to-file Relations and Enhancing its Security against Adversarial Attacks
2019
[139] ScriptNet: Neural Static Analysis for Malicious JavaScript Detection
2019
[140] Comparative Analysis of Ensemble Methods for Classification of Android Malicious Applications
2019
[141] Revisão Sistemática da Literatura das Técnicas baseadas em Texturas para Classificação de Malware
2019
[142] Building a Scalable Simulation Platform for Prototyping Distributed Machine Learning Solutions
2019
[143] Tietoverkkouhat ja niiltä suojautuminen yritysverkossa
2019
[144] 18 Displacing big data
2019
[145] Malware attack and Malware Analysis: A Research
2019
[146] Mimicking Anti-Viruses with Machine Learning and Entropy Profiles
2019
[147] Dynamic Malware Analysis in the Modern Era—A State of the Art Survey
2019
[148] Current State and Modeling of Research Topics in Cybersecurity and Data Science
SYSTEMICS, CYBERNETICS AND INFORMATICS, 2019
[149] Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud
2019
[150] AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
International Journal of Scientific Research and Review, 2019
[151] Application of subspace clustering to scalable malware clustering
2019
[152] A Semi-supervised Learning Methodology for Malware Categorization using Weighted Word Embeddings
2019
[153] MDBA: Detecting Malware based on Bytes N-Gram with Association Mining
2019
[154] A robust and secure backup system for protecting malware
2019
[155] Optimal remote access trojans detection based on network behavior
2019
[156] Similarity-based Intelligent Malware Type Detection through Multiple Sources of Dynamic Characteristics
2019
[157] Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural Network
2019
[158] Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach
2019
[159] Investigating IoT malware characteristics to improve network security
2019
[160] Detection of Malicious Activities in Internet of Things Environment Based on Binary Visualization and Machine Intelligence
2019
[161] Malware Squid: A Novel IoT Malware Traffic Analysis Framework Using Convolutional Neural Network and Binary Visualisation
2019
[162] CapJack: Capture In-Browser Crypto-jacking by Deep Capsule Network through Behavioral Analysis
2019
[163] Generalized Learning Models for Structured Data
2019
[164] An Efficient Botnet Detection Methodology using Hyper-parameter Optimization Trough Grid-Search Techniques
2019
[165] Discovering Future Malware Variants By Generating New Malware Samples Using Generative Adversarial Network
2019
[166] A Survey on Preventing Crypto Ransomware Using Machine Learning
2019
[167] An Intelligent Behavior-Based Ransomware Detection System For Android Platform
2019
[168] Effective Malicious Features Extraction and Classification for Incident Handling Systems
2019
[169] A contempory Taxonomy of Banking Malware
2019
[170] Applications of data analytics and machine learning tools to the enhanced design of modern communication networks and security applications
2019
[171] Discovering Programmer Intention Behind Written Source Code
2019
[172] Network Behavioral Analysis for Detection of Remote Access Trojans
2019
[173] Malware detection in security operation centres
2019
[174] A Digital Forensic Readiness Approach for Ransomware Forensics
2019
[175] Malwares: Creation and Avoidance
2019
[176] Behavioral Entropy Towards Detection of Metamorphic Malwares
2019
[177] Behavioral-based malware clustering and classification
2019
[178] DEEP LEARNING FOR MALWARE DETECTION IN NETWORK TRAFFIC
2019
[179] Embedding Advanced Persistent Threat in Steganographic Images
2019
[180] An Improved Method for Packed Malware Detection using PE Header and Section Table Information.
2019
[181] Detection of Algorithmically Generated Malicious Domain Names using Masked N-Grams
2019
[182] Mal-Flux: Rendering hidden code of packed binary executable
2019
[183] A Close Look at a Daily Dataset of Malware Samples
2019
[184] Malware Capability Assessment using Fuzzy Logic
2019
[185] Detecting indicators of deception in emulated monitoring systems
2019
[186] Malicious code detection based on CNNs and multi-objective algorithm
2019
[187] Malware intelligence: beyond malware analysis
2019
[188] Accelerating convolutional neural network-based malware traffic detection through ant-colony clustering
Journal of Intelligent & Fuzzy Systems, 2019
[189] Byte Label Malware Classification Using Image Entropy
2019
[190] 程序逆向分析在软件供应链污染检测中的应用
2019
[191] Classi cation and static detection of obfuscated web application backdoors
2018
[192] Automatic Malware Signature Generation
2018
[193] Challenges of Malware Analysis: Obfuscation Techniques
2018
[194] Malware Detection: An Investigation Into the Deployment ofArtificial Intelligence for Antimalware Solutions
2018
[195] DLGraph: Malware Detection Using Deep Learning and Graph Embedding
2018
[196] Dynamic API call Sequence Visualization for Malware classification
2018
[197] Methodology for Malware Classification using a Random Forest Classifier
2018
[198] Malware-Detection Model Using Learning-Based Discovery of Static Features
2018
[199] Analisis Klasterisasi Malware: Evaluasi Data Training Dalam Proses Klasifikasi Malware
2018
[200] The Effect on Network Flows-Based Features and Training Set Size on Malware Detection
2018
[201] DeepMal4J: Java Malware Detection Employing Deep Learning
2018
[202] Deep Learning and Visualization for Identifying Malware Families
2018
[203] Large scale machine learning for the detection and classification of malware
2018
[204] Malware identification using visualization images and deep learning
Computers & Security, 2018
[205] MalClassifier: Malware family classification using network flow sequence behaviour
2018
[206] Need for Speed: Analysis of Brazilian Malware Classifiers' Expiration Date
Thesis, 2018
[207] Feature Engineering for Machine Learning and Data Analytics
Feature Engineering for Machine Learning and Data Analytics, 2018
[208] Критерії класифікації методів виявлення шкідливого програмного забезпечення
2018
[209] KOSIGN: 정보보호제품 관점의 사이버위협정보 공유 체계
REVIEW OF KIISC, 2018
[210] Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
Computers & Security, 2018
[211] Can Ternary Computing Improve Information Assurance?
Cryptography, 2018
[212] Analisis dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis dan Malware Analisis Statis
2018
[213] Clustering Morphed Malware using Opcode Sequence Pattern Matching
Recent Patents on Engineering, 2018
[214] Preliminaries and overview
2018
[215] MALWARE DETECTION AND CLASSIFICATION USING MACHINE LEARNING TECHNIQUES
2018
[216] Dynamic Detection Methods
The Huawei and Snowden Questions, 2018
[217] Evaluation of Cisco's Virtual Internet Routing Lab (VIRL) as a Cyber Security Research Tool
2018
[218] Adversarial Examples: Attacks on Machine Learning-based Malware Visualization Detection Methods
2018
[219] Evaluation and Design of Robust Neural Network Defenses
2018
[220] Adaptive flow abnormity identification based on information entropy
Concurrency and computation: practice and experience, 2018
[221] Deep learning at the shallow end: Malware classification for non-domain experts
Digital Investigation, 2018
[222] 가중치 그래프 변환을 통한 네트워크 행위 추상화 기반의 랜섬웨어 분류 모델 제안
Korea Computer Congress 2018, 2018
[223] Zloraba kombinacije obratnega inženirstva, prikrivanja, ukan in varnostnih ranljivosti
2018
[224] Multinomial malware classification via low-level features
Digital Investigation, 2018
[225] Modeling Malware as a Language
2018
[226] The Rough Set Analysis for Malicious Web Campaigns Identification
Image Processing and Communications Challenges 10, 2018
[227] Deep Learning in Information Security
2018
[228] 사이버 위협 정보의 공유 활성화 방안
The Journal of The Korean Institute of Communication Sciences, 2018
[229] Challenge of Malware Analysis: Malware obfuscation Techniques
2018
[230] Malware classification using byte sequence information
RACS 2018 Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018
[231] A Survey on Malware Analysis Techniques: Static, Dynamic, Hybrid and Memory Analysis
2018
[232] Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning
2018
[233] MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
International Journal of Network Security & Its Applications, 2018
[234] Using convolutional neural networks for classification of malware represented as images
Journal of Computer Virology and Hacking Techniques, 2018
[235] Picking on the family: Disrupting android malware triage by forcing misclassification
Expert Systems with Applications, 2018
[236] Malware classification using self organising feature maps and machine activity data
Computers & Security, 2018
[237] A Theoretical Feature-wise Study of Malware Detection Techniques≫
2018
[238] “L'EXTINCTION EST LA RÈGLE, LA SURVIE EST L'EXCEPTION”: REGROUPEMENT DE MALICIELS SELON LEURS COMPORTEMENTS
2018
[239] A Theoretical Feature-wise Study of Malware Detection Techniques
2018
[240] Survey on mobile malware analysis and detection
2018
[241] Oliveira
2018
[242] An Integrated Architecture for IoT Malware Analysis and Detection
2018
[243] First Line Defense Against Spreading New Malware in the Network
2018
[244] ULBP-RF: A Hybrid Approach for Malware Image Classification
2018
[245] Opcode and Gray Scale Techniques for Classification of Malware Binaries
2018
[246] Displacing big data: How criminals cheat the system
2018
[247] MACHINE LEARNING METHODS FOR MALWARE DETECTION AND CLASSIFICATION
2018
[248] 2-Dimension 정적 Feature Set 이 적용된 Convolutional Neural Network 기반의 악성코드 패킹 분석
2018
[249] CLUSTERING MALWARE’S NETWORK BEHAVIOR USING SIMPLE SEQUENTIAL FEATURES
Thesis, 2018
[250] An Android Malware Detection Technique Using Optimized Permission and API with PCA
2018
[251] Feature extraction for enhanced malware detection using genetic algorithm
2018
[252] Are we protected yet? developing a machine learning detection system to combat zero-day malware attacks
2018
[253] Advancing neuro-fuzzy algorithm for automated classification in largescale forensic and cybercrime investigations: adaptive machine learning for big data …
2018
[254] A malware risk analysis and detection system for mobile devices using permission-based features/Mohd Faizal Ab Razak
2018
[255] Malware Detection: An Investigation Into the Deployment of Artificial Intelligence for Antimalware Solutions
2018
[256] Hidden-Code Extraction From Packed Malware Using Memory Based Dynamic Analysis
2017
[257] Malware Classification into Families Based on File Contents and Characteristics
2017
[258] Survey on representation techniques for malware detection system
2017
[259] A semi supervised hybrid protection for network and host based attacks
2017
[260] The effect of code obfuscation on authorship attribution of binary computer files
2017
[261] A Brief Survey on Sandboxing Techniques and It's vulnerabilities
2017
[262] The goods, the bads and the uglies: Supporting decisions in malware detection through visual analytics
2017
[263] Low-Complexity Signature-Based Malware Detection for IoT Devices
Applications and Techniques in Information Security, 2017
[264] Feature Engineering for Twitter-based Applications
2017
[265] Feature Selection and Improving Classification Performance for Malware Detection
2017
[266] A Framework for Generating Malware Threat Intelligence
2017
[267] Malware Fingerprinting under Uncertainty
2017
[268] A Survey on Malware Detection Using Data Mining Techniques
ACM Computing Surveys (CSUR), 2017
[269] A Planner for Supporting Countermeasures in Large Scale Cyber Attacks
Complex, Intelligent, and Software Intensive Systems, 2017
[270] A Framework for Recognition and Confronting of Obfuscated Malwares Based on Memory Dumping and Filter Drivers
Wireless Personal Communications, 2017
[271] Pattern Extraction Algorithm for Netflow-Based Botnet Activities Detection
Hindawi Security and Communication Networks, 2017
[272] Supporting knowledge-assisted rule creation in a behavior-based malware analysis prototype
2017
[273] A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction
Advances on Broad-Band Wireless Computing, Communication and Applications, 2017
[274] Survey on the Usage of Machine Learning Techniques for Malware Analysis
2017
[275] Rule Creation in a Knowledge-assisted Visual Analytics Prototype for Malware Analysis
2017
[276] Malware Detection by HTTPS Traffic Analysis
2017
[277] Data Mining Classification Approaches for Malicious Executable File Detection
2017
[278] Investigation into the Risks Facing Mobile Banking: A Case of Commercial Banks in Kenya
2017
[279] Virtual Machine Introspection Based Malware Behavior Profiling and Family Grouping
2017
[280] A Comparative Overview of Malware Analysis across Operating Systems
ProQuest Dissertations Publishing, 2017
[281] Statistical Evaluation of Malware Classification Algorithms
2017
[282] Malware Detection and Analysis
International Journal of Advanced Research in Computer Science, 2017
[283] Predicting SMT solver performance for software verification
2017
[284] Classification of Malware programs using autoencoders based deep learning architecture and its application to the microsoft malware Classification challenge (BIG …
2017
[285] A Cloud-Based Intelligent and Energy Efficient Malware Detection Framework. A Framework for Cloud-Based, Energy Efficient, and Reliable Malware Detection in …
2017
[286] The Rise of Ransomware
ICSEB 2017 Proceedings of the 2017 International Conference on Software and e-Business, 2017
[287] Analisis Malware Botnet Proteus Pendekatan Static dan Dinamic
2017
[288] Deep Learning Approach to Malware Multi-class Classification Using Image Processing Techniques
2017
[289] A cloud-based intelligent and energy efficient malware detection framework: a framework for cloud-based, energy efficient, and reliable malware detection in real-time …
2017
[290] COMPUTER IMPLEMENTED METHOD FOR CLASSIFYING MOBILE APPLICATIONS AND COMPUTER PROGRAMS THEREOF
2016/01/21/
[291] Análisis digital de una infección de malware en sistemas windows
2016
[292] Malware Characterization Using Windows API Call Sequences
Security, Privacy, and Applied Cryptography Engineering, 2016
[293] Automatic malware classification and new malware detection using machine learning
2016
[294] A three-way decision making approach to malware analysis using probabilistic rough sets
Information Sciences, 2016
[295] Introduction to Malware and Malware Analysis: A brief overview
2016
[296] ClusterMal: Automated Malware Analysis with clustering, anomaly detection and classification of existing and new behavioral analysis
2016
[297] A software classification scheme using binary-level characteristics for efficient software filtering
Soft Computing, 2016
[298] Improving the detection accuracy of unknown malware by partitioning the executables in groups
Advanced Computing and Communication Technologies, 2016
[299] Malware Analysis and Classification Using Sequence Alignments
Intelligent Automation & Soft Computing, 2016
[300] An Effective Approach for Classification of Advanced Malware with High Accuracy
International Journal of Security and Its Applications, 2016
[301] MOBİL KÖTÜCÜL YAZILIMLAR VE GÜVENLİK ÇÖZÜMLERİ ÜZERİNE BİR İNCELEME
Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji, 2016
[302] Identifying malicious activities from system execution traces
2016
[303] A Data Mining Classification Approach for Behavioral Malware Detection
Journal of Computer Networks and Communications, 2016
[304] On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications
2016
[305] The rise of “malware”: Bibliometric analysis of malware study
Journal of Network and Computer Applications, 2016
[306] Scalable malware classification with multifaceted content features and threat intelligence
2016
[307] A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study
International Journal of Information Security, 2016
[308] Equitable Machine Learning Algorithms to Probe Over P2P Botnets
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015, 2016
[309] Tools & Techniques for Malware Analysis and Classification.
International Journal of Next-Generation Computing, 2016
[310] A mining approach for detecting unknown malware using N-Gram and SVM
Advances in Natural and Applied Sciences, 2016
[311] Malware Threat Assessment Using Fuzzy Logic Paradigm
Journal of Adhesion Science and Technology, 2016
[312] Malware Variant Detection Using Opcode Image Recognition with Small Training Sets
2016
[313] A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm
2016
[314] Automated intelligent multinomial classification of malware species using dynamic behavioural analysis
2016
[315] IRMD: Malware Variant Detection Using Opcode Image Recognition
2016
[316] Flow-Graph and Markovian Methods for Cyber Security Analysis
International Journal of Enterprise Information Systems (IJEIS), 2016
[317] Convolutional neural networks for malware classification
2016
[318] Pattern Recognition for Computer Security:Discriminative Models for Email Spam Campaign andMalware Detection
2016
[319] A resource management system design for malware behavior detection
2016
[320] Taxonomy of malware detection techniques
2016
[321] Review of Data Mining Techniques for Malicious Detection
2016
[322] Zero-day malware detection
2016
[323] Σύγχρονα εργαλεία, τεχνικές και μεθοδολογίες για τον χαρακτηρισμό κυβερνοεπιθέσεων και κακόβουλου λογισμικού
2016
[324] An android malware detection system based on cloud computing
2016
[325] Analysis of Rank Distance for Malware Classification
Dissertation, University of Cincinnati, 2016
[326] Taxonomy of malware detection techniques: A systematic literature review
2016
[327] An Approach for Malware Detection and Predictive Analysis Using Artificial Neural Networks
2016
[328] Towards an effective and efficient malware detection system
2016
[329] Pattern recognition for computer security: discriminative models for email spam campaign and malware detection
2016
[330] Pattern recognition for computer security
2016
[331] Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
2016
[332] Loan Approval Prediction based on Machine Learning Approach
2016
[333] Review of data mining techniques for malicious detetion
2016
[334] A Study on Selecting Key Opcodes for Malware Classification and Its Usefulness
2015
[335] Online Manuscript Access
2015
[336] Enhanced Analysis of Kippo-honeypot in Cloud
Thesis, 2015
[337] Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes
2015
[338] Détection des rootkits niveau noyau basée sur LTTng
2015
[339] VISO: Characterizing Malicious Behaviors of Virtual Machines with Unsupervised Clustering
2015
[340] Improved Naive Bayes Classifier for Android Malware Classification
2015
[341] Detecting and Classifying Morphed Malwares: A Survey
International Journal of Computer Applications, 2015
[342] A Three-Way Decision Making Approach to Malware Analysis
Rough Sets and Knowledge Technology, 2015
[343] A Novel Approach to Malware Detection using Static Classification
International Journal of Computer Science and Information Security, 2015
[344] 악성코드 분류를 위한 중요 연산부호 선택 및 그 유용성에 관한 연구
정보과학회논문지, 2015
[345] Measuring Malware Evolution
2015
[346] Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features
arXiv preprint arXiv:1508.03096, 2015
[347] Comparative Analysis of Feature Extraction Methods of Malware Detection
International Journal of Computer Applications, 2015
[348] A Dynamic Malware Analysis for Windows Platform-A Survey
Indian Journal of Science and Technology, 2015
[349] Computational Techniques for Predicting Cyber Threats
Intelligent Computing, Communication and Devices. Springer India, 2015
[350] Malicious Behavior Detection using Windows Audit Logs
arXiv preprint arXiv:1506.04200, 2015
[351] Spectral Malware Behavior Clustering
2015
[352] Malware analysis and classification using Artificial Neural Network
2015
[353] Reverse Engineering For Malware Analysis: Dissecting The Novel Banking Trojan ZeusVM
2015
[354] Quantifying Malware Evolution through Archaeology
Journal of Information Security, 2015
[355] Milware: Identification and Implications of State Authored Malicious Software
Proceedings of the 2015 New Security Paradigms Workshop, 2015
[356] روش تشخیص بدافزار مبتنی بر تحلیل ایستای ساختار PE‎
علوم و فناوريهاي پدافند نوین, 2014
[357] 효율적인 악성코드 분류를 위한 최적의 API 시퀀스 길이 및 조합 도출에 관한 연구
정보보호학회논문지, 2014
[358] 以決策樹偵測殭屍網路之研究
2014
[359] Integrated Framework for Classification of Malwares
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
[360] Classification of PE Files using Static Analysis
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
[361] Agent-based trace learning in a recommendation-verification system for cybersecurity
Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on, 2014
[362] A study on extraction of optimized API sequence length and combination for efficient malware classification
2014
[363] 효율적인 악성코드 분류를 위한최적의 API 시퀀스 길이 및 조합 도출에 관한 연구
2014
[364] 2.1 Overall Malware Classification and Characterization Framework
[365] Detection of Anomalous In-Memory Process based on DLL Sequence
[366] ANALYSIS IN CYBERSPACE
[367] Topic Modeling of Significant Concepts and Terminologies in Cybersecurity and Data Science and Their Potential Guidance to Seed Future Research …
[368] Robust intelligent malware detection using lightgbm algorithm
[369] State of the art: The monero cryptocurrency mining malware detection using supervised machine learning algorithms
[370] Loan Approval Prediction System Using Machine Learning
[371] D​ ETECTION​ S​ YSTEM​(IDS)
[372] The Spy Next Door: A Digital Computer Analysis Approach for Backdoor Trojan Attack
[373] Approaches to Analysing Malware Received from a Reactive Network Telescope
[374] Complex Temporal Networks
[375] Avaliação da Eficácia de Classificadores de Malware ao Longo do Tempo
Free SCIRP Newsletters
Copyright © 2006-2022 Scientific Research Publishing Inc. All Rights Reserved.
Top