Showing 1 - 20 results of 62 for search 'Malwa*', query time: 0.06s Refine Results
  1. 1

    Malware recognition approach based on self‐similarity and an improved clustering algorithm by Jinfu Chen, Chi Zhang, Saihua Cai, Zufa Zhang, Lu Liu, Longxia Huang

    Published 2022-10-01
    “…Abstract The recognition of malware in network traffic is an important research problem. …”
    Get full text
    Article
  2. 2

    Influence of Removable Devices' Heterouse on the Propagation of Malware by Xie Han, Yi-Hong Li, Li-Ping Feng, Li-Peng Song

    Published 2013-01-01
    “…The effects of removable devices’ heterouse in different areas on the propagation of malware spreading via removable devices remain unclear. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Malware Analysis Using Visualized Image Matrices by KyoungSoo Han, BooJoong Kang, Eul Gyu Im

    Published 2014-01-01
    “…Our experimental results show that the image matrices of malware can effectively be used to classify malware families both statically and dynamically with accuracy of 0.9896 and 0.9732, respectively.…”
    Get full text
    Article
  6. 6

    Stochastic Stabilization of Malware Propagation in Wireless Sensor Network via Aperiodically Intermittent White Noise by Xiaojing Zhong, Baihao Peng, Feiqi Deng, Guiyun Liu

    Published 2020-01-01
    “…Our theoretical results can be applied to understand the observed mechanisms of malware and design interventions to control the spread of malware. …”
    Get full text
    Article
  7. 7
  8. 8

    Behavior Intention Derivation of Android Malware Using Ontology Inference by Jian Jiao, Qiyuan Liu, Xin Chen, Hongsheng Cao

    Published 2018-01-01
    “…Previous researches on Android malware mainly focus on malware detection, and malware’s evolution makes the process face certain hysteresis. …”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms by Seunghyun Park, Jin-Young Choi

    Published 2020-01-01
    “…In this study, we propose a machine learning-based data analysis method to accurately detect abnormal behaviors due to malware in large-scale network traffic in real time. …”
    Get full text
    Article
  12. 12

    Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review by Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, Abdulkarim Kanaan Jebna, Kiran Adnan

    Published 2025-01-01
    “…Malwares are growing exponentially and are becoming challenging with time, especially for Small and Medium Enterprises (SMEs). …”
    Get full text
    Article
  13. 13

    Power Consumption Based Android Malware Detection by Hongyu Yang, Ruiwen Tang

    Published 2016-01-01
    “…In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. …”
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    A Data Mining Classification Approach for Behavioral Malware Detection by Monire Norouzi, Alireza Souri, Majid Samad Zamini

    Published 2016-01-01
    “…Also our proposed data mining approach is more efficient for detecting malware and behavioral classification of malware can be useful to detect malware in a behavioral antivirus.…”
    Get full text
    Article
  19. 19

    MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling by Wei Gu, Hongyan Xing, Tianhao Hou

    Published 2024-01-01
    “…These promising experimental results show that MFEMDroid is an effective approach to detect Android malware.…”
    Get full text
    Article
  20. 20

    Combined dynamic multi-feature and rule-based behavior for accurate malware detection by Mohamed Belaoued, Abdelaziz Boukellal, Mohamed Amir Koalal, Abdelouahid Derhab, Smaine Mazouzi, Farrukh Aslam Khan

    Published 2019-11-01
    “…Malware have become the scourge of the century, as they are continuously evolving and becoming more complex with increasing damages. …”
    Get full text
    Article