|
|
|
Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters and Seyit Camtepe
Malware authors apply different techniques of control flow obfuscation, in order to create new malware variants to avoid detection. Existing Siamese neural network (SNN)-based malware detection methods fail to correctly classify different malware familie...
ver más
|
|
|
|
|
|
|
Abigail Copiaco, Leena El Neel, Tasnim Nazzal, Husameldin Mukhtar and Walid Obaid
This study introduces an innovative all-in-one malware identification model that significantly enhances convenience and resource efficiency in classifying malware across diverse file types. Traditional malware identification methods involve the extractio...
ver más
|
|
|
|
|
|
|
Cheng-Jian Lin, Min-Su Huang and Chin-Ling Lee
The applications of computer networks are increasingly extensive, and networks can be remotely controlled and monitored. Cyber hackers can exploit vulnerabilities and steal crucial data or conduct remote surveillance through malicious programs. The frequ...
ver más
|
|
|
|
|
|
|
Vassilios Moussas and Antonios Andreatos
Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software. As a result, various families of variatio...
ver más
|
|
|
|
|
|
|
Maryam Nisa, Jamal Hussain Shah, Shansa Kanwal, Mudassar Raza, Muhammad Attique Khan, Robertas Dama?evicius and Tomas Bla?auskas
As the number of internet users increases so does the number of malicious attacks using malware. The detection of malicious code is becoming critical, and the existing approaches need to be improved. Here, we propose a feature fusion method to combine th...
ver más
|
|
|
|