[HTML][HTML] An empirical study of problems and evaluation of IoT malware classification label sources

T Lei, J Xue, Y Wang, T Baker, Z Niu - Journal of King Saud University …, 2024 - Elsevier
With the proliferation of malware on IoT devices, research on IoT malicious code has also
become more mature. Most studies use learning models to detect or classify malware …

The technological emergence of automl: A survey of performant software and applications in the context of industry

A Scriven, DJ Kedziora, K Musial… - … and Trends® in …, 2023 - nowpublishers.com
With most technical fields, there exists a delay between fundamental academic research and
practical industrial uptake. Whilst some sciences have robust and well-established …

Malware Classification Using Convolutional Fuzzy Neural Networks Based on Feature Fusion and the Taguchi Method

CJ Lin, MS Huang, CL Lee - Applied Sciences, 2022 - mdpi.com
The applications of computer networks are increasingly extensive, and networks can be
remotely controlled and monitored. Cyber hackers can exploit vulnerabilities and steal …

Mi-maml: classifying few-shot advanced malware using multi-improved model-agnostic meta-learning

Y Ji, K Zou, B Zou - Cybersecurity, 2024 - Springer
Malware classification has been successful in utilizing machine learning methods. However,
it is limited by the reliance on a large number of high-quality labeled datasets and the issue …

[PDF][PDF] Static-Analysis Techniques of Malware Reverse Engineering

Z Moric, L Branstett, R Petrunic - Proceedings of DAAAM, Vienna …, 2022 - daaam.info
Network and system security are critical issues of overall Internet security. Scientific papers
and popular literature are full of new security issues being published and analysed daily …

Leveraging Intermediate Languages: Current Applications

L Cannan, T Morris - 2024 4th Interdisciplinary Conference on …, 2024 - ieeexplore.ieee.org
The impacts of leveraging intermediate language representations outside of the standard
compilation process is an area of interest. This work contributes the following: gathering a …

[PDF][PDF] AN IMPROVED MALWARE VARIANT DETECTION MODEL BASED ON HOMOGENEOUS STATIC HYBRID FEATURES AND A DATA AUGMENTATION …

A CLETUS, AA OPOKU, BA WEYORI - Journal of Theoretical and Applied …, 2023 - jatit.org
The use of Machine learning has become the de-facto standard for malware defense due to
the limitations of signature-based, heuristic-based and other cloud-based techniques …

Obfuscated Malware Detection: Investigating Real-World Scenarios Through Memory Analysis

SMR Hasan, A Dhakal - 2023 IEEE International Conference …, 2023 - ieeexplore.ieee.org
In the era of the internet and smart devices, the detection of malware has become crucial for
system security. Malware authors increasingly employ obfuscation techniques to evade …

Architecture of an automated program complex based on a multiple kernel svm classifier for analyzing malicious executable files

А Нафієв, А Родіонов - Сучасний стан наукових досліджень та …, 2024 - itssi-journal.com
Subject matter. This article presents the development and architecture of an automated
program complex designed to identify and analyze malicious executable files using a …

An Artificial Intelligent Enabled Framework for Malware Detection

MP Singh, H Bhat, S Kartikeya… - Artificial Intelligence for …, 2023 - taylorfrancis.com
Malware (Malicious Software) has become a severe threat to society, growing in numbers
and sophistication daily. Malware writers increasingly use advanced techniques like server …