Academic literature on the topic 'Malware Analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malware Analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malware Analysis"
Bavishi, Ujaliben Kalpesh, and Bhavesh Madanlal Jain. "Malware Analysis." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 12 (2018): 27. http://dx.doi.org/10.23956/ijarcsse.v7i12.507.
Full textChintha, Prithvi, and Kakelli Anil Kumar. "EMERGING MACHINE LEARNING TECHNIQUES IN MALWARE DETECTION AND ANALYSIS: A COMPARATIVE ANALYSIS." International Journal of Advanced Research 8, no. 10 (2020): 771–79. http://dx.doi.org/10.21474/ijar01/11900.
Full textPanwala, Harshitkumar R. "A Methodological Study on Malware Analysis." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (2021): 450–52. http://dx.doi.org/10.22214/ijraset.2021.38416.
Full textKrishna, T. Shiva Rama. "Malware Detection using Deep Learning." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 1847–53. http://dx.doi.org/10.22214/ijraset.2021.35426.
Full textSrivastava, Prerna, and Mohan Raj. "Feature extraction for enhanced malware detection using genetic algorithm." International Journal of Engineering & Technology 7, no. 2.8 (2018): 444. http://dx.doi.org/10.14419/ijet.v7i2.8.10479.
Full textSuryati, One Tika, and Avon Budiono. "Impact Analysis of Malware Based on Call Network API With Heuristic Detection Method." International Journal of Advances in Data and Information Systems 1, no. 1 (2020): 1–8. http://dx.doi.org/10.25008/ijadis.v1i1.176.
Full textJang, Jae-wook, and Huy Kang Kim. "Function-Oriented Mobile Malware Analysis as First Aid." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6707524.
Full textJohn Oluwafemi Ogun. "Advancements in automated malware analysis: evaluating the efficacy of open-source tools in detecting and mitigating emerging malware threats to US businesses." International Journal of Science and Research Archive 12, no. 2 (2024): 1958–64. http://dx.doi.org/10.30574/ijsra.2024.12.2.1488.
Full textMuath Alrammal, Muath Alrammal, Munir Naveed Muath Alrammal, Suzan Sallam Munir Naveed, and Georgios Tsaramirsis Suzan Sallam. "A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing." 網際網路技術學刊 23, no. 7 (2022): 1651–61. http://dx.doi.org/10.53106/160792642022122307019.
Full textDener, Murat, Gökçe Ok, and Abdullah Orman. "Malware Detection Using Memory Analysis Data in Big Data Environment." Applied Sciences 12, no. 17 (2022): 8604. http://dx.doi.org/10.3390/app12178604.
Full textDissertations / Theses on the topic "Malware Analysis"
Iqbal, Muhammad Shahid, and Muhammad Sohail. "Runtime Analysis of Malware." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2930.
Full textKrál, Benjamin. "Forenzní analýza malware." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385910.
Full textWedum, Petter Langeland. "Malware Analysis; : A Systematic Approach." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8948.
Full textSantoro, Tiziano. "Automatic behavioural analysis of malware." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-64103.
Full textKim, Ye Kyung. "Framework for Analysis of Android Malware." University of Akron / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=akron1418252974.
Full textSubramanian, Nandita. "Analysis of Rank Distance for Malware Classification." University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1479823187035784.
Full textGorugantu, Swetha. "Malware Analysis Skills Taught in University Courses." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1527083698607394.
Full textCozzi, Emanuele. "Binary Analysis for Linux and IoT Malware." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS197.
Full textCortellazzi, Jacopo. "Code transplantation for adversarial malware." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17288/.
Full textWebb, Matthew S. "Evaluating tool based automated malware analysis through persistence mechanism detection." Thesis, Kansas State University, 2018. http://hdl.handle.net/2097/38783.
Full textBooks on the topic "Malware Analysis"
Yin, Heng, and Dawn Song. Automatic Malware Analysis. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-5523-3.
Full textShane, Hartman, Morales Jose Andre, Quintans Manu, and Strazzere Tim, eds. Android malware and analysis. CRC Press, Taylor & Francis Group, 2014.
Find full textMohanta, Abhijit, and Anoop Saldanha. Malware Analysis and Detection Engineering. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6193-4.
Full textYin, Heng. Automatic Malware Analysis: An Emulator Based Approach. Springer New York, 2013.
Find full textStamp, Mark, Mamoun Alazab, and Andrii Shalaginov, eds. Malware Analysis Using Artificial Intelligence and Deep Learning. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62582-5.
Full textAndrew, Honig, ed. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press, 2012.
Find full textOktavianto, Digit, and Iqbal Muhardianto. Cuckoo Malware Analysis. Packt Publishing, Limited, 2013.
Find full textOktavianto, Digit, and Iqbal Muhardianto. Cuckoo Malware Analysis. Packt Publishing, 2013.
Find full textDunham, Ken, Shane Hartman, Manu Quintans, Jose Andre Morales, and Tim Strazzere. Android Malware and Analysis. Auerbach Publications, 2014. http://dx.doi.org/10.1201/b17598.
Full textBook chapters on the topic "Malware Analysis"
Kävrestad, Joakim. "Malware Analysis." In Fundamentals of Digital Forensics. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96319-8_18.
Full textKävrestad, Joakim. "Malware Analysis." In Fundamentals of Digital Forensics. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38954-3_21.
Full textPatil, Nikita, Amit Kumar Singh, and Sushil Kumar. "Malware Analysis." In Software Engineering Approaches to Enable Digital Transformation Technologies. Routledge, 2023. http://dx.doi.org/10.1201/9781003441601-8.
Full textKävrestad, Joakim, Marcus Birath, and Nathan Clarke. "Malware Analysis." In Texts in Computer Science. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-53649-6_21.
Full textKiperberg, Michael, Amit Resh, and Nezer Zaidenberg. "Malware Analysis." In Computational Methods in Applied Sciences. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-91293-2_21.
Full textMohanta, Abhijit, and Anoop Saldanha. "Malware Packers." In Malware Analysis and Detection Engineering. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6193-4_7.
Full textSteffens, Timo. "Analysis of Malware." In Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9_3.
Full textKang, Brent Byung Hoon, and Anurag Srivastava. "Dynamic Malware Analysis." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_846.
Full textLin, Xiaodong. "Introductory Malware Analysis." In Introductory Computer Forensics. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00581-8_18.
Full textKang, Brent Byung Hoon, and Anurag Srivastava. "Dynamic Malware Analysis." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_846.
Full textConference papers on the topic "Malware Analysis"
Prashanthi, Vempaty, and Srinivas Kanakala. "Malware Analysis using Deep Learning." In 2024 1st International Conference on Advances in Computing, Communication and Networking (ICAC2N). IEEE, 2024. https://doi.org/10.1109/icac2n63387.2024.10895201.
Full textM, Harini Sri, Harsha Vardhan G, Keerthana R, N. Digvijay, and Rohith Vaidya K. "Graph Based Malware Analysis API." In 2025 8th International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2025. https://doi.org/10.1109/icoei65986.2025.11013332.
Full textKunwar, Rakesh Singh, and Priyanka Sharma. "Malware Analysis." In the Second International Conference. ACM Press, 2016. http://dx.doi.org/10.1145/2905055.2905361.
Full textClincy, Victor, and Hossain Shahriar. "IoT Malware Analysis." In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2019. http://dx.doi.org/10.1109/compsac.2019.00141.
Full textAndrade, Cesar Augusto Borges de, Claudio Gomes de Mello, and Julio Cesar Duarte. "Malware Automatic Analysis." In 2013 BRICS Congress on Computational Intelligence & 11th Brazilian Congress on Computational Intelligence (BRICS-CCI & CBIC). IEEE, 2013. http://dx.doi.org/10.1109/brics-cci-cbic.2013.119.
Full textKhalil, Md Yusuf, Vivek, Kumar Anand, Antarlina Paul, and Rahul Grover. "PDF Malware Analysis." In 2022 7th International Conference on Computing, Communication and Security (ICCCS). IEEE, 2022. http://dx.doi.org/10.1109/icccs55188.2022.10079419.
Full textChiang, Ken. "FARM - Malware Information Sharing (Automated Malware Analysis Symposium." In Proposed for presentation at the Automated Malware Analysis Symposium held June 8, 2021 in Linthicum, MD. US DOE, 2021. http://dx.doi.org/10.2172/1871930.
Full textBotacin, Marcus Felipe, Paulo Lício de Geus, and André Grégio. "Hardware-Assisted Malware Analysis." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2018. http://dx.doi.org/10.5753/sbseg_estendido.2018.4136.
Full textBotacin, Marcus, Vitor Falcão da Rocha, Paulo Lício de Geus, and André Grégio. "Analysis, Anti-Analysis, Anti-Anti-Analysis: An Overview of the Evasive Malware Scenario." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19504.
Full textOh, Tae, Hwa Shin Moon, Young Ho Kim, Jeong Neyo Kim, and Bill Stackpole. "Android malware analysis and conceptual malware mitigation approaches." In 2016 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2016. http://dx.doi.org/10.1109/ictc.2016.7763562.
Full textReports on the topic "Malware Analysis"
Peppers, Joseph. Creating a Malware Analysis Lab and Basic Malware Analysis. Iowa State University, 2018. http://dx.doi.org/10.31274/cc-20240624-440.
Full textPearce, Lauren. Windows Internals and Malware Behavior: Malware Analysis Day 3. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1457289.
Full textPearce, Lauren. Covert Malware Launching and Data Encoding: Malware Analysis Day 5. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1457292.
Full textPearce, Lauren. 2018 CyberFire East: Malware Analysis. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1475328.
Full textPearce, Lauren. Incident Response and Malware Analysis. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1481123.
Full textPearce, Lauren. Malware Analysis in a Nutshell. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1330062.
Full textPearce, Lauren. Malware Analysis Report for SolarWinds.Orion.Core.BusinessLayer.dll. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1813804.
Full textPearce, Lauren. Malicious Docs: Malware Analysis Day 7. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1457294.
Full textAmornrattanapong, Weeraphat. Malware Analysis Day 2 - Part 2. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1574734.
Full textTakeda, Keiji. Development of Automated Malware Analysis Framework. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada637212.
Full text