-
1
On the Effectiveness of Perturbations in Generating Evasive Malware Variants
Published 2023-01-01Subjects: “…Malware detection…”
Get full text
Article -
2
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments
Published 2025-02-01Subjects: Get full text
Article -
3
Android Malware Category and Family Identification Using Parallel Machine Learning
Published 2022-07-01Subjects: “…android malware…”
Get full text
Article -
4
Analyzing temporal graphs of malware distribution networks
Published 2022-07-01Subjects: “…Malware…”
Get full text
Article -
5
Approach to assessing the danger of destructive effects of malware on special-purpose automated systems
Published 2023-09-01Subjects: “…malware, classes of malware, behavioral patterns of malware, trojans, viruses and worms, malware utilities.…”
Get full text
Article -
6
Android traffic malware analysis and detection using ensemble classifier
Published 2024-12-01Subjects: “…Malware detection…”
Get full text
Article -
7
GANG-MAM: GAN based enGine for Modifying Android Malware
Published 2022-06-01Subjects: Get full text
Article -
8
MalFe—Malware Feature Engineering Generation Platform
Published 2023-10-01Subjects: “…malware…”
Get full text
Article -
9
A New Malware Classification Framework Based on Deep Learning Algorithms
Published 2021-01-01Subjects: “…Malware…”
Get full text
Article -
10
A Comprehensive Analysis of Today’s Malware and Its Distribution Network: Common Adversary Strategies and Implications
Published 2022-01-01Subjects: Get full text
Article -
11
Design of Automation Environment for Analyzing Various IoT Malware
Published 2021-01-01Subjects: Get full text
Article -
12
A Comprehensive Review on Malware Detection Approaches
Published 2020-01-01Subjects: Get full text
Article -
13
HoneyBow:an automated malware collection tool based on the high-interaction honeypot principle
Published 2007-01-01Subjects: “…malware…”
Get full text
Article -
14
HoneyBow:an automated malware collection tool based on the high-interaction honeypot principle
Published 2007-01-01Subjects: “…malware;malware collection;honeypot;honeynet…”
Get full text
Article -
15
Sisyfos: A Modular and Extendable Open Malware Analysis Platform
Published 2021-03-01Subjects: “…malware analysis…”
Get full text
Article -
16
Identifying Malicious Software Using Deep Residual Long-Short Term Memory
Published 2019-01-01Subjects: “…Malware Detection…”
Get full text
Article -
17
Malware Detection Issues, Challenges, and Future Directions: A Survey
Published 2022-08-01Subjects: Get full text
Article -
18
A Comparative Assessment of Obfuscated Ransomware Detection Methods
Published 2019-01-01Subjects: “…Malware…”
Get full text
Article -
19
Cognitive and Scalable Technique for Securing IoT Networks Against Malware Epidemics
Published 2020-01-01Subjects: “…Malware epidemics…”
Get full text
Article -
20
Improving IoT Botnet Investigation Using an Adaptive Network Layer
Published 2019-02-01Subjects: “…malware…”
Get full text
Article