Journal articles on the topic 'Malware Analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malware Analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bavishi, Ujaliben Kalpesh, and Bhavesh Madanlal Jain. "Malware Analysis." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 12 (2018): 27. http://dx.doi.org/10.23956/ijarcsse.v7i12.507.
Full textChintha, Prithvi, and Kakelli Anil Kumar. "EMERGING MACHINE LEARNING TECHNIQUES IN MALWARE DETECTION AND ANALYSIS: A COMPARATIVE ANALYSIS." International Journal of Advanced Research 8, no. 10 (2020): 771–79. http://dx.doi.org/10.21474/ijar01/11900.
Full textPanwala, Harshitkumar R. "A Methodological Study on Malware Analysis." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (2021): 450–52. http://dx.doi.org/10.22214/ijraset.2021.38416.
Full textKrishna, T. Shiva Rama. "Malware Detection using Deep Learning." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 1847–53. http://dx.doi.org/10.22214/ijraset.2021.35426.
Full textSrivastava, Prerna, and Mohan Raj. "Feature extraction for enhanced malware detection using genetic algorithm." International Journal of Engineering & Technology 7, no. 2.8 (2018): 444. http://dx.doi.org/10.14419/ijet.v7i2.8.10479.
Full textSuryati, One Tika, and Avon Budiono. "Impact Analysis of Malware Based on Call Network API With Heuristic Detection Method." International Journal of Advances in Data and Information Systems 1, no. 1 (2020): 1–8. http://dx.doi.org/10.25008/ijadis.v1i1.176.
Full textJang, Jae-wook, and Huy Kang Kim. "Function-Oriented Mobile Malware Analysis as First Aid." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6707524.
Full textJohn Oluwafemi Ogun. "Advancements in automated malware analysis: evaluating the efficacy of open-source tools in detecting and mitigating emerging malware threats to US businesses." International Journal of Science and Research Archive 12, no. 2 (2024): 1958–64. http://dx.doi.org/10.30574/ijsra.2024.12.2.1488.
Full textMuath Alrammal, Muath Alrammal, Munir Naveed Muath Alrammal, Suzan Sallam Munir Naveed, and Georgios Tsaramirsis Suzan Sallam. "A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing." 網際網路技術學刊 23, no. 7 (2022): 1651–61. http://dx.doi.org/10.53106/160792642022122307019.
Full textDener, Murat, Gökçe Ok, and Abdullah Orman. "Malware Detection Using Memory Analysis Data in Big Data Environment." Applied Sciences 12, no. 17 (2022): 8604. http://dx.doi.org/10.3390/app12178604.
Full textGandotra, Ekta, Divya Bansal, and Sanjeev Sofat. "Malware intelligence: beyond malware analysis." International Journal of Advanced Intelligence Paradigms 13, no. 1/2 (2019): 80. http://dx.doi.org/10.1504/ijaip.2019.099945.
Full textSofat, Sanjeev, Ekta Gandotra, and Divya Bansal. "Malware intelligence: beyond malware analysis." International Journal of Advanced Intelligence Paradigms 13, no. 1/2 (2019): 80. http://dx.doi.org/10.1504/ijaip.2019.10021412.
Full textChristopher ., L. U., and I. T. Ayorinde. "Malware Detection Using Hidden Markov Model." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 37–46. http://dx.doi.org/10.22624/aims/digital/v11n2p4.
Full textM.Sunitha Reddy, Et al. "Exploiting And Estimating Malware Using Feature Impact Derived From API Call Sequence Learning." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 1406–9. http://dx.doi.org/10.17762/ijritcc.v11i10.8684.
Full textLouk, Maya, Hyotaek Lim, and HoonJae Lee. "An Analysis of Security System for Intrusion in Smartphone Environment." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/983901.
Full textSinggam, Pritiy, Afifah Naila Nasution, and Pedro Stella Mario Meyar Waruwu. "Utilizing Capa in Kali Linux for Wannacry Malware Identification and Analysis." AURELIA: Jurnal Penelitian dan Pengabdian Masyarakat Indonesia 4, no. 1 (2024): 1242–45. https://doi.org/10.57235/aurelia.v4i1.4775.
Full textBalaji K. M. and Subbulakshmi T. "Malware Analysis Using Classification and Clustering Algorithms." International Journal of e-Collaboration 18, no. 1 (2022): 1–26. http://dx.doi.org/10.4018/ijec.290290.
Full textNur Widiyasono, Siti Rahayu Selamat, Angga Sinjaya, Rianto, Randi Rizal, and Mugi Praseptiawan. "Investigation of Malware Redline Stealer Using Static and Dynamic Analysis Method Forensic." Journal of Advanced Research in Applied Sciences and Engineering Technology 48, no. 2 (2024): 49–62. http://dx.doi.org/10.37934/araset.48.2.4962.
Full textShoraimov, Khusanboy Uktamboyevich Akhmadjonov Islomjon Kozimjon o'gli. "A SYSTEMATIC LITERATURE REVIEW ON MALWARE ANALYSIS." EURASIAN JOURNAL OF ACADEMIC RESEARCH 2, no. 13 (2022): 860–66. https://doi.org/10.5281/zenodo.7471397.
Full textLYSENKO, S., and R. SCHUKA. "ANALYSIS OF MALWARE DETECTION METHODS IN COMPUTER SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 283, no. 2 (2020): 101–7. https://doi.org/10.31891/2307-5732-2020-283-2-101-107.
Full textTariq, Muhammad Arham, Muhammad Ismaeel Khan, Aftab Arif, Muhammad Aksam Iftikhar, and Ali Raza A. Khan. "Malware Images Visualization and Classification with Parameter Tunned Deep Learning Model." Metallurgical and Materials Engineering 31, no. 2 (2025): 68–73. https://doi.org/10.63278/1336.
Full textKumar, Rajeev, Mamdouh Alenezi, Md Ansari, Bineet Gupta, Alka Agrawal, and Raees Khan. "Evaluating the Impact of Malware Analysis Techniques for Securing Web Applications through a Decision-Making Framework under Fuzzy Environment." International Journal of Intelligent Engineering and Systems 13, no. 6 (2020): 94–109. http://dx.doi.org/10.22266/ijies2020.1231.09.
Full textTahir, Naquash, Ahmad Yusuf, Singh Satyam, Kumar Shubhanshu, and Anjana Yash. "Detection of Malware Using Machine Learning Algorithms." Advancement in Image Processing and Pattern Recognition 6, no. 1 (2023): 1–12. https://doi.org/10.5281/zenodo.7609730.
Full textGarg, Umang, Santosh Kumar, and Manoj Kumar. "IHBOT: An Intelligent and Hybrid Model for Investigation and Classification of IoT Botnet." International Journal of Computer Network and Information Security 16, no. 5 (2024): 98–112. http://dx.doi.org/10.5815/ijcnis.2024.05.08.
Full textNair, Riya, Kiranbhai R. Dodiya, and Parth Lakhalani. "A Static Approach for Malware Analysis: A Guide to Analysis Tools and Techniques." International Journal for Research in Applied Science and Engineering Technology 11, no. 12 (2023): 1451–74. http://dx.doi.org/10.22214/ijraset.2023.57649.
Full textDas, Pragya Paramita. "Malware Analysis Using Memory Forensics." International Journal for Research in Applied Science and Engineering Technology 10, no. 10 (2022): 488–95. http://dx.doi.org/10.22214/ijraset.2022.47021.
Full textChawla, Karan. "A Study of Malware Analysis and Malware Detection Methods in Cyber-Security." International Journal of Scientific Engineering and Research 11, no. 5 (2023): 51–56. https://doi.org/10.70729/se23515123724.
Full textYildiz, Oktay, and Ibrahim Alper Doğru. "Permission-based Android Malware Detection System Using Feature Selection with Genetic Algorithm." International Journal of Software Engineering and Knowledge Engineering 29, no. 02 (2019): 245–62. http://dx.doi.org/10.1142/s0218194019500116.
Full textSyam, Gopi, Susan Jacob Evelyn, John Joel, Rajeev Raynell, and Alex Steve. "Malware Classification using Image Analysis." International Journal on Emerging Research Areas (IJERA) 05, no. 01 (2025): 178–82. https://doi.org/10.5281/zenodo.15289798.
Full textJiao, Jian, Qiyuan Liu, Xin Chen, and Hongsheng Cao. "Behavior Intention Derivation of Android Malware Using Ontology Inference." Journal of Electrical and Computer Engineering 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/9250297.
Full textS., Navaneethan, and Udhaya Kumar S. "ScanSavant: Malware Detection for Android Applications with Explainable AI." International Journal of Interactive Mobile Technologies (iJIM) 18, no. 19 (2024): 171–81. http://dx.doi.org/10.3991/ijim.v18i19.49437.
Full textShoraimov, Khusanboy Uktamboyevich Akhmadjonov Islomjon Kozimjon o'gli. "A MALWARE VARIANT RESISTANT TO TRADITIONAL ANALYSIS TECHNIQUES A FORENSIC ANALYSIS OF ANDROID MALWARE." EURASIAN JOURNAL OF ACADEMIC RESEARCH 2, no. 13 (2022): 867–78. https://doi.org/10.5281/zenodo.7471401.
Full textJoshi, Ankit, Komesh Borkar, Rohit Dhote, et al. "A Machine Learning Technique to Detect Malware." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 188–93. http://dx.doi.org/10.22214/ijraset.2022.47841.
Full textWaliulu, Raditya Faisal, and Teguh Hidayat Iskandar Alam. "Reverse Engineering Analysis Statis Forensic Malware Webc2-Div." Insect (Informatics and Security): Jurnal Teknik Informatika 4, no. 1 (2019): 15. http://dx.doi.org/10.33506/insect.v4i1.223.
Full textSM-D. "Practical Malware Analysis." Network Security 2012, no. 12 (2012): 4. http://dx.doi.org/10.1016/s1353-4858(12)70109-5.
Full textPotter, Bruce. "Scalable malware analysis." Network Security 2008, no. 4 (2008): 18–20. http://dx.doi.org/10.1016/s1353-4858(08)70055-2.
Full textWagener, Gérard, Radu State, and Alexandre Dulaunoy. "Malware behaviour analysis." Journal in Computer Virology 4, no. 4 (2007): 279–87. http://dx.doi.org/10.1007/s11416-007-0074-9.
Full textElizarov, D. A., and A. V. Katkov. "Practical Malware Analysis." Herald of Dagestan State Technical University. Technical Sciences 50, no. 3 (2023): 66–71. http://dx.doi.org/10.21822/2073-6185-2023-50-3-66-71.
Full textBuriyev, Yusuf Absamat ugli. "NETWORK MALWARE ANALYSIS." EURASIAN JOURNAL OF ACADEMIC RESEARCH 2, no. 13 (2022): 1045–52. https://doi.org/10.5281/zenodo.7478806.
Full textMichalopoulos, P., V. Ieronymakis, M. T. Khan, and D. Serpanos. "An Open Source, Extensible Malware Analysis Platform." MATEC Web of Conferences 188 (2018): 05009. http://dx.doi.org/10.1051/matecconf/201818805009.
Full textYucel, Cagatay, Adam Lockett, Ioannis Chalkias, Dimitrios Mallis, and Vasilios Katos. "MAIT: Malware Analysis and Intelligence Tool." Information & Security: An International Journal 50 (2021): 49–65. http://dx.doi.org/10.11610/isij.5024.
Full textLeenu Singh, Leenu Singh, and Syed Imtiyaz Hassan. "Virtualization Evolution For Transparent Malware Analysis." International Journal of Scientific Research 2, no. 6 (2012): 101–4. http://dx.doi.org/10.15373/22778179/june2013/33.
Full textDhungana, Dikshyant, Ashish Sapkota, Sabigya Pokharel, Sudarshan Devkota, and Bishnu Hari Paudel. "Malware Classification using Static Analysis Approaches." Journal of Artificial Intelligence and Capsule Networks 6, no. 4 (2025): 494–511. https://doi.org/10.36548/jaicn.2024.4.008.
Full textAl-Marghilani, A. "Comprehensive Analysis of IoT Malware Evasion Techniques." Engineering, Technology & Applied Science Research 11, no. 4 (2021): 7495–500. http://dx.doi.org/10.48084/etasr.4296.
Full textM Jameel, Naz faith, and Muna M. T. Jawhar. "A Survey on Malware Attacks Analysis and Detected." International Research Journal of Innovations in Engineering and Technology 07, no. 05 (2023): 32–40. http://dx.doi.org/10.47001/irjiet/2023.705005.
Full textVidyarthi, Deepti, S. P. Choudhary, Subrata Rakshit, and C. R. S. Kumar. "Malware Detection by Static Checking and Dynamic Analysis of Executables." International Journal of Information Security and Privacy 11, no. 3 (2017): 29–41. http://dx.doi.org/10.4018/ijisp.2017070103.
Full textРЕГІДА, ПАВЛО, ОЛЕКСАНДЕР БАРМАК, АНТОНІНА КАШТАЛЬЯН та ЕДУАРД МАНЗЮК. "КОНЦЕПЦІЯ ЗАСТОСУВАННЯ РОЗПОДІЛЕНИХ СИСТЕМ ДЛЯ АНАЛІЗУ ПОЛІМОРФНИХ ВІРУСІВ". Herald of Khmelnytskyi National University. Technical sciences 331, № 1 (2024): 38–43. http://dx.doi.org/10.31891/2307-5732-2024-331-4.
Full textSingh, Veeraj R., Sharmila S P, and Narendra S. Chaudhari. "A Study on Analysis of Malware in Android Applications." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 141–48. http://dx.doi.org/10.22214/ijraset.2022.47268.
Full textSumargo, Ruly, and Handri Santoso. "Uncovering Malware Families Using Convolutional Neural Networks (CNN)." Indonesian Journal of Artificial Intelligence and Data Mining 7, no. 1 (2023): 97. http://dx.doi.org/10.24014/ijaidm.v7i1.27243.
Full textBrahara, Beni, Dedy Syamsuar, and Yesi Novaria Kunang. "Analysis of Malware Dns Attack on the Network Using Domain Name System Indicators." Journal of Information Systems and Informatics 2, no. 1 (2020): 131–53. http://dx.doi.org/10.33557/journalisi.v2i1.30.
Full text