Detection approaches for android malware: Taxonomy and review analysis
HHR Manzil, SM Naik - Expert Systems with Applications, 2024 - Elsevier
The main objective of this review is to present an in-depth study of Android malware
detection approaches. This article provides a comprehensive survey of 150 studies on …
detection approaches. This article provides a comprehensive survey of 150 studies on …
Transfer learning for image-based malware detection for iot
P Panda, OK CU, S Marappan, S Ma, D Veesani Nandi - Sensors, 2023 - mdpi.com
The tremendous growth in online activity and the Internet of Things (IoT) led to an increase
in cyberattacks. Malware infiltrated at least one device in almost every household. Various …
in cyberattacks. Malware infiltrated at least one device in almost every household. Various …
MIGAN: GAN for facilitating malware image synthesis with improved malware classification on novel dataset
O Sharma, A Sharma, A Kalia - Expert Systems with Applications, 2024 - Elsevier
Malware visualization is a technique wherein malware binaries are represented as
grayscale or color images in order to identify and extract discriminating features for …
grayscale or color images in order to identify and extract discriminating features for …
Windows and IoT malware visualization and classification with deep CNN and Xception CNN using Markov images
O Sharma, A Sharma, A Kalia - Journal of Intelligent Information Systems, 2023 - Springer
Context Technological advances have led to a tremendous increase in complexity and
volume of specialized malware, affecting computational devices across the globe. Along …
volume of specialized malware, affecting computational devices across the globe. Along …
Tri-channel visualised malicious code classification based on improved ResNet
S Li, J Wang, Y Song, S Wang - Applied Intelligence, 2024 - Springer
As malicious code attacks continue to evolve, attackers leverage techniques like packing
and code obfuscation to generate numerous variants, challenging traditional detection …
and code obfuscation to generate numerous variants, challenging traditional detection …
An Attention Mechanism for Combination of CNN and VAE for Image-Based Malware Classification
T Van Dao, H Sato, M Kubo - IEEE Access, 2022 - ieeexplore.ieee.org
Currently, malware is increasing in both number and complexity dramatically. Several
techniques and methodologies have been proposed to detect and neutralize malicious …
techniques and methodologies have been proposed to detect and neutralize malicious …
A lightweight model for malicious code classification based on structural reparameterisation and large convolutional kernels
S Li, J Wang, Y Song, S Wang, Y Wang - International Journal of …, 2024 - Springer
With the advancement of adversarial techniques for malicious code, malevolent attackers
have propagated numerous malicious code variants through shell coding and code …
have propagated numerous malicious code variants through shell coding and code …
Malware Variants Detection Model Based on MFF–HDBA
S Wang, J Wang, Y Song, S Li, W Huang - Applied Sciences, 2022 - mdpi.com
A massive proliferation of malware variants has posed serious and evolving threats to
cybersecurity. Developing intelligent methods to cope with the situation is highly necessary …
cybersecurity. Developing intelligent methods to cope with the situation is highly necessary …
PAFE: A lightweight visualization-based fast malware classification method
S Li, J Wang, S Wang, Y Song - Heliyon, 2024 - cell.com
With the development of automated malware toolkits, cybersecurity faces evolving threats.
Although visualization-based malware analysis has proven to be an effective method …
Although visualization-based malware analysis has proven to be an effective method …
Dynamic IoT malware detection in Android systems using profile hidden Markov models
The prevalence of malware attacks that target IoT systems has raised an alarm and
highlighted the need for efficient mechanisms to detect and defeat them. However, detecting …
highlighted the need for efficient mechanisms to detect and defeat them. However, detecting …