Malware detection employed by visualization and deep neural network
With the fast growth of malware's volume circulating in the wild, to obtain a timely and correct
classification is increasingly difficult. Traditional approaches to automatic classification suffer …
classification is increasingly difficult. Traditional approaches to automatic classification suffer …
Drishti: an integrated indoor/outdoor blind navigation system and service
L Ran, S Helal, S Moore - Second IEEE annual conference on …, 2004 - ieeexplore.ieee.org
There are many navigation systems for visually impaired people but few can provide
dynamic interactions and adaptability to changes. None of these systems work seamlessly …
dynamic interactions and adaptability to changes. None of these systems work seamlessly …
Classification of malware families based on runtime behaviors
A Pektaş, T Acarman - Journal of information security and applications, 2017 - Elsevier
Classification of malware samples plays a crucial role in building and maintaining security.
Design of a malware classification system capable of supporting a large set of samples and …
Design of a malware classification system capable of supporting a large set of samples and …
Malware classification based on API calls and behaviour analysis
A Pektaş, T Acarman - IET Information Security, 2018 - Wiley Online Library
This study presents the runtime behaviour‐based classification procedure for Windows
malware. Runtime behaviours are extracted with a particular focus on the determination of a …
malware. Runtime behaviours are extracted with a particular focus on the determination of a …
Andro-simnet: Android malware family classification using social network analysis
While the rapid adaptation of mobile devices changes our daily life more conveniently, the
threat derived from malware is also increased. There are lots of research to detect malware …
threat derived from malware is also increased. There are lots of research to detect malware …
Extracting the representative API call patterns of malware families using recurrent neural network
I Kwon, EG Im - Proceedings of the international conference on …, 2017 - dl.acm.org
With thousands of malware samples pouring out every day, how can we reduce malware
analysis time and detect them effectively? Malware family classification provides one of …
analysis time and detect them effectively? Malware family classification provides one of …
Malware function classification using apis in initial behavior
N Kawaguchi, K Omote - 2015 10th Asia Joint Conference on …, 2015 - ieeexplore.ieee.org
Malware proliferation has become a serious threat to the Internet in recent years. Most of the
current malware are subspecies of existing malware that have been automatically generated …
current malware are subspecies of existing malware that have been automatically generated …
Toward an automatic, online behavioral malware classification system
R Canzanese, M Kam… - 2013 IEEE 7th …, 2013 - ieeexplore.ieee.org
Malware authors are increasingly using specialized toolkits and obfuscation techniques to
modify existing malware and avoid detection by traditional antivirus software. The resulting …
modify existing malware and avoid detection by traditional antivirus software. The resulting …
Run-time classification of malicious processes using system call analysis
R Canzanese, S Mancoridis… - 2015 10th International …, 2015 - ieeexplore.ieee.org
This study presents a malware classification system designed to classify malicious
processes at run-time on production hosts. The system monitors process-level system call …
processes at run-time on production hosts. The system monitors process-level system call …
Metamorphic malicious code behavior detection using probabilistic inference methods
C Choi, C Esposito, M Lee, J Choi - Cognitive Systems Research, 2019 - Elsevier
Existing antivirus programs detect malicious code based on fixed signatures; therefore, they
have limitations in detecting metamorphic malicious code that lacks signature information or …
have limitations in detecting metamorphic malicious code that lacks signature information or …