Survey of machine learning techniques for malware analysis
Coping with malware is getting more and more challenging, given their relentless growth in
complexity and volume. One of the most common approaches in literature is using machine …
complexity and volume. One of the most common approaches in literature is using machine …
A survey of the recent trends in deep learning based malware detection
Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying
malicious activity. Malicious activities potentially lead to a system breach or data …
malicious activity. Malicious activities potentially lead to a system breach or data …
Malware classification and composition analysis: A survey of recent developments
Malware detection and classification are becoming more and more challenging, given the
complexity of malware design and the recent advancement of communication and …
complexity of malware design and the recent advancement of communication and …
A systematic review on intrusion detection based on the Hidden Markov Model
A Ahmadian Ramaki, A Rasoolzadegan… - … Analysis and Data …, 2018 - Wiley Online Library
Apart from using traditional security solutions in software systems such as firewalls and
access control mechanisms, utilizing intrusion detection systems are also necessary …
access control mechanisms, utilizing intrusion detection systems are also necessary …
Mdfrcnn: Malware detection using faster region proposals convolution neural network
M Deore, U Kulkarni - 2022 - reunir.unir.net
Technological advancement of smart devices has opened up a new trend: Internet of
Everything (IoE), where all devices are connected to the web. Large scale networking …
Everything (IoE), where all devices are connected to the web. Large scale networking …
Malware resistant data protection in hyper-connected networks: A survey
Data protection is the process of securing sensitive information from being corrupted,
compromised, or lost. A hyperconnected network, on the other hand, is a computer …
compromised, or lost. A hyperconnected network, on the other hand, is a computer …
Computer network virus defense with data mining-based active protection
X Li, Y Li, H He - Scalable Computing: Practice and Experience, 2024 - scpe.org
A novel approach is presented in this paper to address the limitations of virtual machine
technology, active kernel technology, heuristic killing technology, and behaviour killing …
technology, active kernel technology, heuristic killing technology, and behaviour killing …
An advanced profile hidden Markov model for malware detection
AA Alipour, E Ansari - Intelligent Data Analysis, 2020 - content.iospress.com
The rapid growth of malicious software (malware) production in recent decades and the
increasing number of threats posed by malware to network environments, such as the …
increasing number of threats posed by malware to network environments, such as the …
The state of the malware: What can we defend against?
CA Visaggio - Monitoring and Protection of Critical Infrastructure …, 2023 - ebooks.iospress.nl
The number of malware is increasingly growing and they become more and more
sophisticated. This is a sign that malware is nowadays a real industry, with investments …
sophisticated. This is a sign that malware is nowadays a real industry, with investments …
Classification of computer viruses from binary code using ensemble classifier and recursive feature elimination
P Usaphapanus, K Piromsopa - 2017 Twelfth International …, 2017 - ieeexplore.ieee.org
This paper proposes a supervised machine learning model for detecting (unseen) viruses
files. Our main focus is on static analysis approach. To find the best method, we experiment …
files. Our main focus is on static analysis approach. To find the best method, we experiment …