[HTML][HTML] A systematic literature review on windows malware detection: Techniques, research issues, and future directions
The aim of this systematic literature review (SLR) is to provide a comprehensive overview of
the current state of Windows malware detection techniques, research issues, and future …
the current state of Windows malware detection techniques, research issues, and future …
A comparison of static, dynamic, and hybrid analysis for malware detection
A Damodaran, FD Troia, CA Visaggio… - Journal of Computer …, 2017 - Springer
In this research, we compare malware detection techniques based on static, dynamic, and
hybrid analysis. Specifically, we train Hidden Markov Models (HMMs) on both static and …
hybrid analysis. Specifically, we train Hidden Markov Models (HMMs) on both static and …
Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits
K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …
changing battlefield over who can innovate over the other. While security analysts are …
Malware detection using machine learning and deep learning
Research shows that over the last decade, malware have been growing exponentially,
causing substantial financial losses to various organizations. Different anti-malware …
causing substantial financial losses to various organizations. Different anti-malware …
[图书][B] Introduction to machine learning with applications in information security
M Stamp - 2022 - taylorfrancis.com
Introduction to Machine Learning with Applications in Information Security, Second Edition
provides a classroom-tested introduction to a wide variety of machine learning and deep …
provides a classroom-tested introduction to a wide variety of machine learning and deep …
Hidden Markov models for malware classification
Previous research has shown that hidden Markov model (HMM) analysis is useful for
detecting certain challenging classes of malware. In this research, we consider the related …
detecting certain challenging classes of malware. In this research, we consider the related …
Didn't You Hear Me?---Towards More Successful Web Vulnerability Notifications
After treating the notification of affected parties as mere side-notes in research, our
community has recently put more focus on how vulnerability disclosure can be conducted at …
community has recently put more focus on how vulnerability disclosure can be conducted at …
Firma: Malware clustering and network signature generation with mixed network behaviors
MZ Rafique, J Caballero - Research in Attacks, Intrusions, and Defenses …, 2013 - Springer
The ever-increasing number of malware families and polymorphic variants creates a
pressing need for automatic tools to cluster the collected malware into families and generate …
pressing need for automatic tools to cluster the collected malware into families and generate …
A lustrum of malware network communication: Evolution and insights
Both the operational and academic security communities have used dynamic analysis
sandboxes to execute malware samples for roughly a decade. Network information derived …
sandboxes to execute malware samples for roughly a decade. Network information derived …
{WebWitness}: Investigating, Categorizing, and Mitigating Malware Download Paths
T Nelms, R Perdisci, M Antonakakis… - 24th USENIX Security …, 2015 - usenix.org
Most modern malware download attacks occur via the browser, typically due to social
engineering and driveby downloads. In this paper, we study the “origin” of malware …
engineering and driveby downloads. In this paper, we study the “origin” of malware …