58   Artículos

 
en línea
Xinyi Meng and Daofeng Li    
The explosive growth of malware targeting Android devices has resulted in the demand for the acquisition and integration of comprehensive information to enable effective, robust, and user-friendly malware detection. In response to this challenge, this pa... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Falah Amer Abdulazeez, Ismail Taha Ahmed and Baraa Tareq Hammad    
A significant quantity of malware is created on purpose every day. Users of smartphones and computer networks now mostly worry about malware. These days, malware detection is a major concern in the cybersecurity area. Several factors can impact malware d... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ehab Alkhateeb, Ali Ghorbani and Arash Habibi Lashkari    
This research addresses a critical need in the ongoing battle against malware, particularly in the form of obfuscated malware, which presents a formidable challenge in the realm of cybersecurity. Developing effective antivirus (AV) solutions capable of c... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nikola Andelic, Sandi Baressi ?egota and Zlatan Car    
Malware detection using hybrid features, combining binary and hexadecimal analysis with DLL calls, is crucial for leveraging the strengths of both static and dynamic analysis methods. Artificial intelligence (AI) enhances this process by enabling automat... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Abishek Manikandaraja, Peter Aaby and Nikolaos Pitropakis    
Artificial intelligence and machine learning have become a necessary part of modern living along with the increased adoption of new computational devices. Because machine learning and artificial intelligence can detect malware better than traditional sig... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Aleksandr Romanov, Anna Kurtukova, Anastasia Fedotova and Alexander Shelupanov    
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors. Any program is ma... ver más
Revista: Information    Formato: Electrónico

 
en línea
Omar Azib Alkhudaydi, Moez Krichen and Ans D. Alghamdi    
With the increasing severity and frequency of cyberattacks, the rapid expansion of smart objects intensifies cybersecurity threats. The vast communication traffic data between Internet of Things (IoT) devices presents a considerable challenge in defendin... ver más
Revista: Information    Formato: Electrónico

 
en línea
Abir Rahali and Moulay A. Akhloufi    
To proactively mitigate malware threats, cybersecurity tools, such as anti-virus and anti-malware software, as well as firewalls, require frequent updates and proactive implementation. However, processing the vast amounts of dataset examples can be overw... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters and Seyit Camtepe    
Malware authors apply different techniques of control flow obfuscation, in order to create new malware variants to avoid detection. Existing Siamese neural network (SNN)-based malware detection methods fail to correctly classify different malware familie... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zhiguo Chen and Xuanyu Ren    
In previous years, cybercriminals have utilized various strategies to evade identification, including obfuscation, confusion, and polymorphism technology, resulting in an exponential increase in the amount of malware that poses a serious threat to comput... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »