Mathematical approaches transform cybersecurity from protoscience to science

I Trenchev, W Dimitrov, G Dimitrov, T Ostrovska… - Applied Sciences, 2023 - mdpi.com
The area of cybersecurity problems has reached the stage of becoming a science. This
raises questions about the connection between the mathematical theories used in …

The making of indicator of compromise using malware reverse engineering techniques

B Akram, D Ogi - 2020 International Conference on ICT for …, 2020 - ieeexplore.ieee.org
Malware threats often go undetected immediately, because attackers can camouflage well
within the system. The users realize this after the devices stop working and cause harm for …

[PDF][PDF] Static Malware Detection And Analysis Using Machine Learning Methods

K Malik, M Kumar, M Sony, R Mukhraiya… - … and Applications in …, 2022 - mililink.com
Detecting malware by a computer program is usually eliminated with the help of an antivirus
program that considers each and every program in the structure of known malware. One …

Investigation Malware Analysis Depend on Reverse Engineering Using IDAPro

MF Ismael, KH Thanoon - 2022 8th International Conference on …, 2022 - ieeexplore.ieee.org
Any software that runs malicious payloads on victims' computers is referred to as malware. It
is an increasing threat that costs people, businesses, and organizations a lot of money …

Integrated Security System Implementation for Network Intrusion

RM Muhammad, ID Irawati, M Iqbal - Journal of Hunan University …, 2021 - jonuns.com
Network security systems vary much according to the circumstances and conditions
concerned. A network security system plays a very important role in maintaining network …

The threat of screenshot-taking malware: analysis, detection and prevention

H Sbai - 2022 - ora.ox.ac.uk
Among the various types of spyware, screenloggers are distinguished by their ability to
capture screenshots. This gives them considerable nuisance capacity, giving rise to theft of …

CNN-Based Malware Family Classification and Evaluation

MW Hebish, M Awni - 2024 14th International Conference on …, 2024 - ieeexplore.ieee.org
Due to the diversity of malware types and families and the rapid increase of malware attacks,
there is a need to develop a way to find and categorize the malware to its families …

Utilizing Reverse Engineering Technique for A Malware Analysis Model

A Amiruddin, PNH Suryani, SD Santoso… - Scientific Journal of …, 2021 - journal.unnes.ac.id
Purpose: Malicious software or malware is a real threat to the security of computer systems
or networks. Researchers made various attempts to find information and knowledge about …

Analisis Malicious Software Trojan Downloader Pada Android Menggunakan Teknik Reverse Engineering (Studi Kasus: Kamus Kesehatan v2. apk)

AD Putra, JD Santoso… - Building of Informatics …, 2022 - ejurnal.seminar-id.com
Abstrak− Perkembangan teknologi ponsel cerdas berplatform android telah mencapai
kemajuan yang sangat pesat. Ponsel cerdas membantu dan memudahkan pekerjaan …

Analisis Malware Aquvaprn. exe Untuk Investigasi Sistem Operasi Dengan Metode Memory Forensics

HN Aditya, N Widiyasono… - … Teknik Informatika dan …, 2024 - journal.maranatha.edu
In today's digital age, data has become a valuable asset. Various techniques are used to
steal personal data that could potentially be misused by irresponsible parties. The object …