Academic literature on the topic 'Malware'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malware.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malware"
Sehrawat, Sahil, and Dr Dinesh Singh. "Malware and Malware Detection Techniques: A Survey." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 3947–53. http://dx.doi.org/10.22214/ijraset.2022.43287.
Full textKrishna, T. Shiva Rama. "Malware Detection using Deep Learning." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1847–53. http://dx.doi.org/10.22214/ijraset.2021.35426.
Full textJoshi, Sakshi, and Santosh Mahagaonkar. "MALWARE DETECTION USING MACHINE LEARNING TECHNIQUES." International Journal of Engineering Applied Sciences and Technology 7, no. 5 (September 1, 2022): 86–91. http://dx.doi.org/10.33564/ijeast.2022.v07i05.014.
Full textMarcello, Mario. "Collecting Malware in Swiss German University with Low Energy and Cost Computer." Journal of Applied Information, Communication and Technology 5, no. 2 (October 28, 2018): 85–91. http://dx.doi.org/10.33555/ejaict.v5i2.57.
Full textWang, Shuo, Jian Wang, Yafei Song, and Song Li. "Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs." Computational Intelligence and Neuroscience 2021 (December 14, 2021): 1–10. http://dx.doi.org/10.1155/2021/1070586.
Full textBavishi, Ujaliben Kalpesh, and Bhavesh Madanlal Jain. "Malware Analysis." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 12 (January 3, 2018): 27. http://dx.doi.org/10.23956/ijarcsse.v7i12.507.
Full textIsmail, Ismahani, Sulaiman Mohd Nor, and Muhammad Nadzir Marsono. "Stateless Malware Packet Detection by Incorporating Naive Bayes with Known Malware Signatures." Applied Computational Intelligence and Soft Computing 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/197961.
Full textZhang, Yu, and Feng Xia. "A Self-Relocation Based Method for Malware Detection." Applied Mechanics and Materials 220-223 (November 2012): 2688–93. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2688.
Full textSrivastava, Prerna, and Mohan Raj. "Feature extraction for enhanced malware detection using genetic algorithm." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 444. http://dx.doi.org/10.14419/ijet.v7i2.8.10479.
Full textJohn Oluwafemi Ogun. "Advancements in automated malware analysis: evaluating the efficacy of open-source tools in detecting and mitigating emerging malware threats to US businesses." International Journal of Science and Research Archive 12, no. 2 (August 30, 2024): 1958–64. http://dx.doi.org/10.30574/ijsra.2024.12.2.1488.
Full textDissertations / Theses on the topic "Malware"
Alzarooni, K. M. A. "Malware variant detection." Thesis, University College London (University of London), 2012. http://discovery.ucl.ac.uk/1347243/.
Full textKrál, Benjamin. "Forenzní analýza malware." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385910.
Full textPark, Sean. "Neural malware detection." Thesis, Federation University Australia, 2019. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/173759.
Full textDoctor of Philosophy
Iqbal, Muhammad Shahid, and Muhammad Sohail. "Runtime Analysis of Malware." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2930.
Full text+46 736 51 83 01
Carlin, Domhnall. "Dynamic analyses of malware." Thesis, Queen's University Belfast, 2018. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.766287.
Full textHuang, Alex Yangyang. "Towards robust malware detection." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119758.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 45-48).
A central challenge of malware detection using machine learning methods is the presence of adversarial variants, small changes to detectable malware that allow it to evade a model (i.e. be classified as benign). We take inspiration from adversarial variant generation methods in the continuous-valued image domain to introduce methods for malware in the binary domain. We incorporate these methods in the training of hardened models towards the goal of robustness against adversarial variants. Additionally, we provide visualization tools for analysis of hardened models. Our tools illustrate the difference in loss behavior between models trained with different methods, the effect of adversarial learning on the loss landscape of a model, and the effect of adversarial learning on the decision map of a model. The adversarial learning framework and the visualization tools in combination allow for the creation and understanding of robust models.
by Alex Yangyang Huang.
M. Eng.
O'Kane, P. C. "Detection of obfuscated malware." Thesis, Queen's University Belfast, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.680235.
Full textКалайчев, Г. В. "Microsoft malware prediction competition." Thesis, ХНУРЕ, 2020. http://openarchive.nure.ua/handle/document/12127.
Full textKhoda, Mahbub. "Robust Mobile Malware Detection." Thesis, Federation University Australi, 2020. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/176412.
Full textDoctor of Philosophy
Cortellazzi, Jacopo. "Code transplantation for adversarial malware." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17288/.
Full textBooks on the topic "Malware"
Gritzalis, Dimitris, Kim-Kwang Raymond Choo, and Constantinos Patsakis, eds. Malware. Cham: Springer Nature Switzerland, 2025. http://dx.doi.org/10.1007/978-3-031-66245-4.
Full textKrieg, Christian, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, and Edgar Weippl. Hardware Malware. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-031-02338-5.
Full textChristodorescu, Mihai, Somesh Jha, Douglas Maughan, Dawn Song, and Cliff Wang, eds. Malware Detection. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-44599-1.
Full textJiang, Xuxian, and Yajin Zhou. Android Malware. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7394-7.
Full textAlmomani, Iman, Leandros A. Maglaras, Mohamed Amine Ferrag, and Nick Ayres, eds. Cyber Malware. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-34969-0.
Full textYin, Heng, and Dawn Song. Automatic Malware Analysis. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-5523-3.
Full textDavis, Michael A. Hacking exposed malware & rootkits: Malware & rootkits security secrets & solutions. New York: McGraw Hill, 2010.
Find full textSean, Bodmer, and LeMasters Aaron, eds. Hacking exposed malware & rootkits: Malware & rootkits security secrets & solutions. New York: McGraw Hill, 2010.
Find full textShane, Hartman, Morales Jose Andre, Quintans Manu, and Strazzere Tim, eds. Android malware and analysis. Boca Raton: CRC Press, Taylor & Francis Group, 2014.
Find full textBook chapters on the topic "Malware"
Aebi, Daniel. "Malware." In Praxishandbuch Sicherer IT-Betrieb, 109–42. Wiesbaden: Gabler Verlag, 2004. http://dx.doi.org/10.1007/978-3-322-90469-0_6.
Full textPrasad, Ramjee, and Vandana Rohokale. "Malware." In Springer Series in Wireless Technology, 67–81. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31703-4_5.
Full textKappes, Martin. "Malware." In Netzwerk- und Datensicherheit, 95–105. Wiesbaden: Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-8348-8612-5_6.
Full textRawal, Bharat S., Gunasekaran Manogaran, and Alexender Peter. "Malware." In Cybersecurity and Identity Access Management, 103–16. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2658-7_6.
Full textHuber, Edith. "Malware." In Cybercrime, 75–98. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-26150-4_6.
Full textKappes, Martin. "Malware." In Netzwerk- und Datensicherheit, 115–26. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-16127-9_6.
Full textJiang, Xuxian, and Yajin Zhou. "Introduction." In Android Malware, 1–2. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7394-7_1.
Full textJiang, Xuxian, and Yajin Zhou. "A Survey of Android Malware." In Android Malware, 3–20. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7394-7_2.
Full textJiang, Xuxian, and Yajin Zhou. "Case Studies." In Android Malware, 21–29. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7394-7_3.
Full textJiang, Xuxian, and Yajin Zhou. "Discussion." In Android Malware, 31–32. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7394-7_4.
Full textConference papers on the topic "Malware"
Liu, Yanni, Ayong Ye, Yuanhuang Liu, and Wenting Lu. "Few-Shot Malware Classification using Malware Variant and Model Augmentation." In 2024 International Conference on Networking and Network Applications (NaNA), 399–404. IEEE, 2024. http://dx.doi.org/10.1109/nana63151.2024.00073.
Full textChen, Shang-Wen, Tzu-Hsien Chuang, Chin-Wei Tien, and Chih-Wei Chen. "An Experience in Enhancing Machine Learning Classifier Against Low-Entropy Packed Malwares." In 8th International Conference on Computer Science and Information Technology (CoSIT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110406.
Full textBarros, Pedro H., Gabriel N. Gomes, Leonardo B. Barbosa, and Heitor S. Ramos. "Zero^2-SMELL: Uma nova abordagem de aprendizado zero-shot para detectar vulnerabilidades de dia zero." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbseg.2021.17309.
Full textBarros, Pedro H., Gabriel N. Gomes, Leonardo B. Barbosa, and Heitor S. Ramos. "Zero^2-SMELL: Uma nova abordagem de aprendizado zero-shot para detectar vulnerabilidades de dia zero." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbseg.2021.17309.
Full textSonco, Leonardo Karling, Angelo Nogueira, Diego Kreutz, and Rodrigo Brandão Masilha. "Uma GUI para hackers do bem aprenderem sobre malwares sintéticos." In Escola Regional de Engenharia de Software, 109–17. Sociedade Brasileira de Computação, 2024. https://doi.org/10.5753/eres.2024.4293.
Full textSilva, Gabriel H. N. Espindola da, Gilberto Fernandes Junior, and Bruno Bogaz Zarpelão. "Impacto de ataques de evasão e eficácia da defesa baseada em treinamento adversário em detectores de malware." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais, 829–35. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbseg.2024.240800.
Full textVaduva, Janalexandru, Vladraul Pasca, Iuliamaria Florea, and Razvan Rughinis. "APPLICATIONS OF MACHINE LEARNING IN MALWARE DETECTION." In eLSE 2019. Carol I National Defence University Publishing House, 2019. http://dx.doi.org/10.12753/2066-026x-19-110.
Full textEren, Maksim E., Manish Bhattarai, Kim Rasmussen, Boian S. Alexandrov, and Charles Nicholas. "MalwareDNA: Simultaneous Classification of Malware, Malware Families, and Novel Malware." In 2023 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2023. http://dx.doi.org/10.1109/isi58743.2023.10297217.
Full textTestoni, Gustavo A., Marcos Paulo L. A. Pereira, Sérgio S. Cardoso, Clayton E. das Chagas, and Ronaldo R. Goldschimidt. "EB-CyberDef: Um Ambiente Integrado de Defesa Cibernética para Apoio à Detecção e ao Combate de Comportamentos Maliciosos no Tráfego de Redes de Computadores." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/sbseg_estendido.2022.224128.
Full textMohd Shaid, Syed Zainudeen, and Mohd Aizaini Maarof. "Malware behavior image for malware variant identification." In 2014 International Symposium on Biometrics and Security Technologies (ISBAST). IEEE, 2014. http://dx.doi.org/10.1109/isbast.2014.7013128.
Full textReports on the topic "Malware"
Porras, Phillip, Hassen Saidi, and Vinod Yegneswaran. Malware Pandemics. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada531166.
Full textPearce, Lauren. Windows Internals and Malware Behavior: Malware Analysis Day 3. Office of Scientific and Technical Information (OSTI), June 2018. http://dx.doi.org/10.2172/1457289.
Full textPeppers, Joseph. Creating a Malware Analysis Lab and Basic Malware Analysis. Ames (Iowa): Iowa State University, January 2018. http://dx.doi.org/10.31274/cc-20240624-440.
Full textPearce, Lauren. Covert Malware Launching and Data Encoding: Malware Analysis Day 5. Office of Scientific and Technical Information (OSTI), June 2018. http://dx.doi.org/10.2172/1457292.
Full textPearce, Lauren. Research Topics in Malware. Office of Scientific and Technical Information (OSTI), October 2016. http://dx.doi.org/10.2172/1329850.
Full textPearce, Lauren. 2018 CyberFire East: Malware Analysis. Office of Scientific and Technical Information (OSTI), October 2018. http://dx.doi.org/10.2172/1475328.
Full textPearce, Lauren. Incident Response and Malware Analysis. Office of Scientific and Technical Information (OSTI), November 2018. http://dx.doi.org/10.2172/1481123.
Full textPearce, Lauren. Malware Analysis in a Nutshell. Office of Scientific and Technical Information (OSTI), October 2016. http://dx.doi.org/10.2172/1330062.
Full textPearce, Lauren. Malware Analysis Report for SolarWinds.Orion.Core.BusinessLayer.dll. Office of Scientific and Technical Information (OSTI), August 2021. http://dx.doi.org/10.2172/1813804.
Full textAlexandrov, Boian, and Maksim Eren. Tensor Text-Mining Methods for Malware Identification and Detection, Malware Dynamics Characterization, and Hosts Ranking. Office of Scientific and Technical Information (OSTI), October 2021. http://dx.doi.org/10.2172/1826495.
Full text