Academic literature on the topic 'Malware attack detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malware attack detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malware attack detection"
Bhaya, Wesam S., and Mustafa A. Ali. "Review on Malware and Malware Detection Using Data Mining Techniques." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 25, no. 5 (2017): 1585–601. http://dx.doi.org/10.29196/jub.v25i5.104.
Full textJagriti, Kumari, and B. Sowmya. "Malware Detection in Applications using a Virtual Environment." Research and Applications of Web Development and Design 4, no. 2 (2021): 1–7. https://doi.org/10.5281/zenodo.5509642.
Full textVinod Kumar, Boddupally, K. Pranaya Vardhan, Kurceti Subba Rao, and Thipparthy Navya Sree. "IDENTIFICATION OF UNSATURATED ATTACKS IN VIRTUALIZED INFRASTRUCTURES WITH BIG DATA ANALYTICS IN CLOUD COMPUTING." Journal of Nonlinear Analysis and Optimization 14, no. 02 (2023): 286–92. http://dx.doi.org/10.36893/jnao.2023.v14i2.286-292.
Full textAlazab, Ammar, Michael Hobbs, Jemal Abawajy, and Ansam Khraisat. "Malware Detection and Prevention System Based on Multi-Stage Rules." International Journal of Information Security and Privacy 7, no. 2 (2013): 29–43. http://dx.doi.org/10.4018/jisp.2013040102.
Full textD, Sathya. "A Report on Botnet Detection Techniques for Intrusion Detection Systems." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 2022–31. http://dx.doi.org/10.22214/ijraset.2022.44253.
Full textDu, Yao, Mengtian Cui, and Xiaochun Cheng. "A Mobile Malware Detection Method Based on Malicious Subgraphs Mining." Security and Communication Networks 2021 (April 17, 2021): 1–11. http://dx.doi.org/10.1155/2021/5593178.
Full textRamadhani, Arsabilla, Fauzi Adi Rafrastara, Salma Rosyada, Wildanil Ghozi, and Waleed Mahgoub Osman. "IMPROVING MALWARE DETECTION USING INFORMATION GAIN AND ENSEMBLE MACHINE LEARNING." Jurnal Teknik Informatika (Jutif) 5, no. 6 (2024): 1673–86. https://doi.org/10.52436/1.jutif.2024.5.6.3903.
Full textPatil, Shruti, Vijayakumar Varadarajan, Devika Walimbe, et al. "Improving the Robustness of AI-Based Malware Detection Using Adversarial Machine Learning." Algorithms 14, no. 10 (2021): 297. http://dx.doi.org/10.3390/a14100297.
Full textAlzahrani, Mohammad Eid. "Employing Incremental Learning for the Detection of Multiclass New Malware Variants." Indian Journal Of Science And Technology 17, no. 10 (2024): 941–48. http://dx.doi.org/10.17485/ijst/v17i10.2862.
Full textSuryati, One Tika, and Avon Budiono. "Impact Analysis of Malware Based on Call Network API With Heuristic Detection Method." International Journal of Advances in Data and Information Systems 1, no. 1 (2020): 1–8. http://dx.doi.org/10.25008/ijadis.v1i1.176.
Full textDissertations / Theses on the topic "Malware attack detection"
Yu, Yue. "Resilience Strategies for Network Challenge Detection, Identification and Remediation." Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/10277.
Full textBláha, Lukáš. "Analýza automatizovaného generování signatur s využitím Honeypotu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236430.
Full textWood, Adrian Michael. "A defensive strategy for detecting targeted adversarial poisoning attacks in machine learning trained malware detection models." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2021. https://ro.ecu.edu.au/theses/2483.
Full textTheerthagiri, Dinesh. "Reversing Malware : A detection intelligence with in-depth security analysis." Thesis, Linköping University, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-52058.
Full textHarshe, Omkar Anand. "Preemptive Detection of Cyber Attacks on Industrial Control Systems." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/54005.
Full textDarwaish, Asim. "Adversary-aware machine learning models for malware detection systems." Electronic Thesis or Diss., Université Paris Cité, 2022. http://www.theses.fr/2022UNIP7283.
Full textGitzinger, Louison. "Surviving the massive proliferation of mobile malware." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S058.
Full textGriffin, Mark. "Assessment of run-time malware detection through critical function hooking and process introspection against real-world attacks." Thesis, The University of Texas at San Antonio, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1538324.
Full textBarabosch, Thomas Felix [Verfasser]. "Formalization and Detection of Host-Based Code Injection Attacks in the Context of Malware / Thomas Felix Barabosch." Bonn : Universitäts- und Landesbibliothek Bonn, 2018. http://d-nb.info/1173789804/34.
Full textBarabosch, Thomas [Verfasser]. "Formalization and Detection of Host-Based Code Injection Attacks in the Context of Malware / Thomas Felix Barabosch." Bonn : Universitäts- und Landesbibliothek Bonn, 2018. http://d-nb.info/1173789804/34.
Full textBooks on the topic "Malware attack detection"
Saxe, Joshua, and Hillary Sanders. Malware Data Science: Attack Detection and Attribution. No Starch Press, 2018.
Find full textBook chapters on the topic "Malware attack detection"
Lucas, Keane, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, and Saurabh Shintre. "Deceiving ML-Based Friend-or-Foe Identification for Executables." In Advances in Information Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16613-6_10.
Full textFritsch, Lothar, Aws Jaber, and Anis Yazidi. "An Overview of Artificial Intelligence Used in Malware." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-17030-0_4.
Full textKurmus, Anil, Sergej Dechand, and Rüdiger Kapitza. "Quantifiable Run-Time Kernel Attack Surface Reduction." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-08509-8_12.
Full textWang, An, Aziz Mohaisen, Wentao Chang, and Songqing Chen. "Capturing DDoS Attack Dynamics Behind the Scenes." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20550-2_11.
Full textLarson, Ulf, Emilie Lundin-Barse, and Erland Jonsson. "METAL – A Tool for Extracting Attack Manifestations." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506881_6.
Full textWang, Wubing, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, and Zhiqiang Lin. "Specularizer : Detecting Speculative Execution Attacks via Performance Tracing." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80825-9_8.
Full textBen Salem, Malek, and Salvatore J. Stolfo. "Decoy Document Deployment for Effective Masquerade Attack Detection." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22424-9_3.
Full textGruss, Daniel, Clémentine Maurice, Klaus Wagner, and Stefan Mangard. "Flush+Flush: A Fast and Stealthy Cache Attack." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40667-1_14.
Full textRietz, René, Michael Vogel, Franka Schuster, and Hartmut König. "Parallelization of Network Intrusion Detection Systems under Attack Conditions." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-08509-8_10.
Full textGruss, Daniel, Clémentine Maurice, and Stefan Mangard. "Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40667-1_15.
Full textConference papers on the topic "Malware attack detection"
Kumar, Kaushal, Aasia Parveen, Faisal Hasan, Ajay Kumar, Aditya Jain, and Vinay Kumar. "Malware Attack Detection Using Machine Learning Techniques." In 2024 4th Asian Conference on Innovation in Technology (ASIANCON). IEEE, 2024. https://doi.org/10.1109/asiancon62057.2024.10838032.
Full textIge, Tosin, Christopher Kiekintveld, Aritran Piplai, Amy Wagler, Olukunle Kolade, and Bolanle Hafiz Matti. "An in-Depth Investigation Into the Performance of State-of-the-Art Zero-Shot, Single-Shot, and Few-Shot Learning Approaches on an Out-of-Distribution Zero-Day Malware Attack Detection." In 2024 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2024. http://dx.doi.org/10.1109/isncc62547.2024.10758952.
Full textOuazza, Hajra, Fadoua Khennou, and Abderrahim Abdellaoui. "Adversarial Retraining and White-Box Attacks for Robust Malware Detection." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012053.
Full textKulkarni, Siddhant, and Hemant Rathore. "DNN-GRAD: Exploiting Membership Inference for Adversarial Attacks on Malware Detection Models." In 2025 IEEE 22nd Consumer Communications & Networking Conference (CCNC). IEEE, 2025. https://doi.org/10.1109/ccnc54725.2025.10975992.
Full textChen, Yi-Ming, Yu-Cheng Yan, and Qing-Min Yang. "Using Explainability Techniques to Assist Android Malware Detection Models in Resisting Adversarial Attacks." In 2024 11th International Conference on Soft Computing & Machine Intelligence (ISCMI). IEEE, 2024. https://doi.org/10.1109/iscmi63661.2024.10851553.
Full textMittal, Saksham, Mohammad Wazid, D. P. Singh, and Mukesh Singh. "An Ensemble Learning Based Approach for Detection of Malware Attacks in IoT Network." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687748.
Full textBalakrishnan, S., S. Leelavathy, Sunil Kumar RM, and S. Simonthomas. "Machine Learning based Portable Executable Malware and DDoS Attacks Detection in IoT Networks." In 2025 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2025. https://doi.org/10.1109/iciccs65191.2025.10984796.
Full textChenet, Cristiano Pegoraro, Alessandro Savino, and Stefano Di Carlo. "Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core." In 2025 IEEE 26th Latin American Test Symposium (LATS). IEEE, 2025. https://doi.org/10.1109/lats65346.2025.10963939.
Full textMihai, Ioan cosmin, and Laurentiu Giurea. "MANAGEMENT OF ELEARNING PLATFORMS SECURITY." In eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-061.
Full textZhao, Kaifa, Hao Zhou, Yulin Zhu, et al. "Structural Attack against Graph Based Android Malware Detection." In CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2021. http://dx.doi.org/10.1145/3460120.3485387.
Full text