-
1
Homology analysis of malware based on graph
Published 2017-11-01Subjects: “…malware…”
Get full text
Article -
2
-
3
Influence of Removable Devices' Heterouse on the Propagation of Malware
Published 2013-01-01“…The effects of removable devices’ heterouse in different areas on the propagation of malware spreading via removable devices remain unclear. …”
Get full text
Article -
4
Malware Analysis Using Visualized Image Matrices
Published 2014-01-01“…Our experimental results show that the image matrices of malware can effectively be used to classify malware families both statically and dynamically with accuracy of 0.9896 and 0.9732, respectively.…”
Get full text
Article -
5
Power Consumption Based Android Malware Detection
Published 2016-01-01“…In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. …”
Get full text
Article -
6
Review of malware detection and classification visualization techniques
Published 2023-10-01Subjects: Get full text
Article -
7
A Survey on Adversarial Attacks for Malware Analysis
Published 2025-01-01Subjects: Get full text
Article -
8
Malware detection approach based on improved SOINN
Published 2019-12-01Subjects: Get full text
Article -
9
Malware prediction technique based on program gene
Published 2018-08-01Subjects: Get full text
Article -
10
Android malware detection method based on combined algorithm
Published 2016-10-01Subjects: “…malware detection…”
Get full text
Article -
11
Android malware detection based on improved random forest
Published 2017-04-01Subjects: Get full text
Article -
12
Android malware detection method based on SimHash
Published 2017-11-01Subjects: Get full text
Article -
13
Research on Android malware detection based on permission and behavior
Published 2017-03-01Get full text
Article -
14
Modeling and Analysis of the Spread of Malware with the Influence of User Awareness
Published 2021-01-01“…By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. …”
Get full text
Article -
15
Behavior Intention Derivation of Android Malware Using Ontology Inference
Published 2018-01-01“…Previous researches on Android malware mainly focus on malware detection, and malware’s evolution makes the process face certain hysteresis. …”
Get full text
Article -
16
HTTP behavior characteristics generation and extraction approach for Android malware
Published 2016-08-01“…Growing of Android malware,not only seriously endangered the security of the Android market,but also brings challenges for detection.A generation and extraction approach of automatic Android malware behavioral signatures was proposed based on HTTP traffic.Firstly,the behavioral signatures were extracted from the traffic traces generated by Android malware.Then,network behavioral characteristics were extracted from the generated network traffic.Finally,these behavioral signatures were used to detect Android malware.The experimental results show that the approach is able to extract Android malware network traffic behavioral signature with accuracy and efficiency.…”
Get full text
Article -
17
Research on the reverse analyses and monitoring data of Mirai malware botnet
Published 2017-08-01Subjects: Get full text
Article -
18
Android malware detection based on APK signature information feedback
Published 2017-05-01“…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
Get full text
Article -
19
Online analytical model of massive malware based on feature clusting
Published 2013-08-01Subjects: “…malware…”
Get full text
Article -
20
Android malware detection method based on deep neural network
Published 2020-10-01Subjects: Get full text
Article