Journal articles on the topic 'Malware attack detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malware attack detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bhaya, Wesam S., and Mustafa A. Ali. "Review on Malware and Malware Detection Using Data Mining Techniques." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 25, no. 5 (2017): 1585–601. http://dx.doi.org/10.29196/jub.v25i5.104.
Full textJagriti, Kumari, and B. Sowmya. "Malware Detection in Applications using a Virtual Environment." Research and Applications of Web Development and Design 4, no. 2 (2021): 1–7. https://doi.org/10.5281/zenodo.5509642.
Full textVinod Kumar, Boddupally, K. Pranaya Vardhan, Kurceti Subba Rao, and Thipparthy Navya Sree. "IDENTIFICATION OF UNSATURATED ATTACKS IN VIRTUALIZED INFRASTRUCTURES WITH BIG DATA ANALYTICS IN CLOUD COMPUTING." Journal of Nonlinear Analysis and Optimization 14, no. 02 (2023): 286–92. http://dx.doi.org/10.36893/jnao.2023.v14i2.286-292.
Full textAlazab, Ammar, Michael Hobbs, Jemal Abawajy, and Ansam Khraisat. "Malware Detection and Prevention System Based on Multi-Stage Rules." International Journal of Information Security and Privacy 7, no. 2 (2013): 29–43. http://dx.doi.org/10.4018/jisp.2013040102.
Full textD, Sathya. "A Report on Botnet Detection Techniques for Intrusion Detection Systems." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 2022–31. http://dx.doi.org/10.22214/ijraset.2022.44253.
Full textDu, Yao, Mengtian Cui, and Xiaochun Cheng. "A Mobile Malware Detection Method Based on Malicious Subgraphs Mining." Security and Communication Networks 2021 (April 17, 2021): 1–11. http://dx.doi.org/10.1155/2021/5593178.
Full textRamadhani, Arsabilla, Fauzi Adi Rafrastara, Salma Rosyada, Wildanil Ghozi, and Waleed Mahgoub Osman. "IMPROVING MALWARE DETECTION USING INFORMATION GAIN AND ENSEMBLE MACHINE LEARNING." Jurnal Teknik Informatika (Jutif) 5, no. 6 (2024): 1673–86. https://doi.org/10.52436/1.jutif.2024.5.6.3903.
Full textPatil, Shruti, Vijayakumar Varadarajan, Devika Walimbe, et al. "Improving the Robustness of AI-Based Malware Detection Using Adversarial Machine Learning." Algorithms 14, no. 10 (2021): 297. http://dx.doi.org/10.3390/a14100297.
Full textAlzahrani, Mohammad Eid. "Employing Incremental Learning for the Detection of Multiclass New Malware Variants." Indian Journal Of Science And Technology 17, no. 10 (2024): 941–48. http://dx.doi.org/10.17485/ijst/v17i10.2862.
Full textSuryati, One Tika, and Avon Budiono. "Impact Analysis of Malware Based on Call Network API With Heuristic Detection Method." International Journal of Advances in Data and Information Systems 1, no. 1 (2020): 1–8. http://dx.doi.org/10.25008/ijadis.v1i1.176.
Full textMohammad, Eid Alzahrani. "Employing Incremental Learning for the Detection of Multiclass New Malware Variants." Indian Journal of Science and Technology 17, no. 10 (2024): 941–48. https://doi.org/10.17485/IJST/v17i10.2862.
Full textGyamfi, Nana Kwame, Nikolaj Goranin, Dainius Ceponis, and Habil Antanas Čenys. "Automated System-Level Malware Detection Using Machine Learning: A Comprehensive Review." Applied Sciences 13, no. 21 (2023): 11908. http://dx.doi.org/10.3390/app132111908.
Full textAslan, Ömer, Merve Ozkan-Okay, and Deepti Gupta. "A Review of Cloud-Based Malware Detection System: Opportunities, Advances and Challenges." European Journal of Engineering and Technology Research 6, no. 3 (2021): 1–8. http://dx.doi.org/10.24018/ejers.2021.6.3.2372.
Full textAslan, Ömer, Merve Ozkan-Okay, and Deepti Gupta. "A Review of Cloud-Based Malware Detection System: Opportunities, Advances and Challenges." European Journal of Engineering and Technology Research 6, no. 3 (2021): 1–8. http://dx.doi.org/10.24018/ejeng.2021.6.3.2372.
Full textZhang, Yunchun, Jiaqi Jiang, Chao Yi, et al. "A Robust CNN for Malware Classification against Executable Adversarial Attack." Electronics 13, no. 5 (2024): 989. http://dx.doi.org/10.3390/electronics13050989.
Full textWang, Fangwei, Yuanyuan Lu, Changguang Wang, and Qingru Li. "Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection." Wireless Communications and Mobile Computing 2021 (August 30, 2021): 1–9. http://dx.doi.org/10.1155/2021/8736946.
Full textLi, Deqiang, Qianmu Li, Yanfang (Fanny) Ye, and Shouhuai Xu. "Arms Race in Adversarial Malware Detection: A Survey." ACM Computing Surveys 55, no. 1 (2023): 1–35. http://dx.doi.org/10.1145/3484491.
Full textImran, Muhammad, Annalisa Appice, and Donato Malerba. "Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection." Future Internet 16, no. 5 (2024): 168. http://dx.doi.org/10.3390/fi16050168.
Full textJohn Oluwafemi Ogun. "Advancements in automated malware analysis: evaluating the efficacy of open-source tools in detecting and mitigating emerging malware threats to US businesses." International Journal of Science and Research Archive 12, no. 2 (2024): 1958–64. http://dx.doi.org/10.30574/ijsra.2024.12.2.1488.
Full textChristiana, Abikoye Oluwakemi, Benjamin Aruwa Gyunka, and Akande Noah. "Android Malware Detection through Machine Learning Techniques: A Review." International Journal of Online and Biomedical Engineering (iJOE) 16, no. 02 (2020): 14. http://dx.doi.org/10.3991/ijoe.v16i02.11549.
Full textChen, Hongyi, Jinshu Su, Linbo Qiao, and Qin Xin. "Malware Collusion Attack against SVM: Issues and Countermeasures." Applied Sciences 8, no. 10 (2018): 1718. http://dx.doi.org/10.3390/app8101718.
Full textMaulana, Reza, Deris Stiawan, and Rahmat Budiarto. "Detection of android malware with deep learning method using convolutional neural network model." Computer Science and Information Technologies 6, no. 1 (2025): 68–79. https://doi.org/10.11591/csit.v6i1.p68-79.
Full textPrakash, Surbhi, and AK Mohapatra. "Robust Analysis of XXE Attack Produced by Malware." International Journal of Membrane Science and Technology 10, no. 1 (2023): 674–85. http://dx.doi.org/10.15379/ijmst.v10i1.2630.
Full textWhite, Darring. "Advxai in Malware Analysis Framework: Balancing Explainability with Security." International Journal on Soft Computing, Artificial Intelligence and Applications 14, no. 1 (2025): 11–18. https://doi.org/10.5121/ijscai.2025.14102.
Full textZhang, Shuhui, Changdong Hu, Lianhai Wang, Miodrag J. Mihaljevic, Shujiang Xu, and Tian Lan. "A Malware Detection Approach Based on Deep Learning and Memory Forensics." Symmetry 15, no. 3 (2023): 758. http://dx.doi.org/10.3390/sym15030758.
Full textHarrsheeta, Sasikumar. "DDoS Attack Detection and Classification using Machine Learning Models with Real-Time Dataset Created." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 5 (2021): 145–53. https://doi.org/10.35940/ijrte.E5217.019521.
Full textKaushik, Dr Priyanka. "Unleashing the Power of Multi-Agent Deep Learning: Cyber-Attack Detection in IoT." International Journal for Global Academic & Scientific Research 2, no. 2 (2023): 23–45. http://dx.doi.org/10.55938/ijgasr.v2i2.46.
Full textZi Wei, Yee, Marina Md-Arshad, Adlina Abdul Samad, and Norafida Ithnin. "Comparing Malware Attack Detection using Machine Learning Techniques in IoT Network Traffic." International Journal of Innovative Computing 13, no. 1 (2023): 21–27. http://dx.doi.org/10.11113/ijic.v13n1.384.
Full textSen, Saurabh Kumar, and Anuradha Deolase. "Analyse Cyberattack at Organizations using Logistic Regression Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 518–25. http://dx.doi.org/10.22214/ijraset.2022.40663.
Full textAlmehmadi, Lamia, Abdullah Basuhail, Daniyal Alghazzawi, and Osama Rabie. "Framework for Malware Triggering Using Steganography." Applied Sciences 12, no. 16 (2022): 8176. http://dx.doi.org/10.3390/app12168176.
Full textSudarsan, Paka, V. N. V. S. K. Vinay, Rejeti Pavan Satya Kumar, and Burugupalli Jagadeesh. "Detection of Malware in Android Application using Machine Learning." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44095.
Full textKong, Zixiao, Jingfeng Xue, Zhenyan Liu, Yong Wang, and Weijie Han. "MalDBA: Detection for Query-Based Malware Black-Box Adversarial Attacks." Electronics 12, no. 7 (2023): 1751. http://dx.doi.org/10.3390/electronics12071751.
Full textUrooj, Umara, Bander Ali Saleh Al-rimy, Mazen Gazzan, et al. "A Wide and Weighted Deep Ensemble Model for Behavioral Drifting Ransomware Attacks." Mathematics 13, no. 7 (2025): 1037. https://doi.org/10.3390/math13071037.
Full textSingh, Abhay Pratap, and Mahendra Singh. "Real time malware detection in encrypted network traffic using machine learning with time based features." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 841–50. http://dx.doi.org/10.47974/jdmsc-1760.
Full textSaavedra de la Cueva, Marcela Estefania, Juan Carlos Pazmiño Quiñonez, and Luis Enrique Yulán Mendoza. "Optimización del Análisis de Malware en Laboratorios Virtualizados." Revista Científica Élite 7, no. 1 (2025): 1–12. https://doi.org/10.69603/itsqmet.vol7.n1.2025.105.
Full textDo Xuan, Cho, and Duc Duong. "Optimization of APT attack detection based on a model combining ATTENTION and deep learning." Journal of Intelligent & Fuzzy Systems 42, no. 4 (2022): 4135–51. http://dx.doi.org/10.3233/jifs-212570.
Full textSaeedAlmarri and Paul Sant Dr. "Optimised Malware Detection in Digital Forensics." International Journal of Network Security & Its Applications (IJNSA) 6, no. 1 (2014): 01–15. https://doi.org/10.5281/zenodo.5900306.
Full textNguyen, Duc Viet, and Dinh Quan Dang. "Proposing A New Approach for Detecting Malware Based on the Event Analysis Technique." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 12, no. 8 (2023): 21–27. https://doi.org/10.35940/ijitee.H9651.0712823.
Full textAlbishry, Nabeel, Rayed AlGhamdi, Abdulmohsen Almalawi, Asif Irshad Khan, Pravin R. Kshirsagar, and BaruDebtera. "An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques." Computational Intelligence and Neuroscience 2022 (April 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/5061059.
Full textAlbishry, Nabeel, Rayed AlGhamdi, Abdulmohsen Almalawi, Asif Irshad Khan, Pravin R. Kshirsagar, and BaruDebtera. "An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques." Computational Intelligence and Neuroscience 2022 (April 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/5061059.
Full textJasi, Teba Ali, and Muna M. Taher Jawhar. "Detecting network attacks Model based on a long short-term memory LSTM." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 8 (2022): 64–72. http://dx.doi.org/10.47577/technium.v4i8.7225.
Full textSenanayake, Janaka, Harsha Kalutarage, and Mhd Omar Al-Kadri. "Android Mobile Malware Detection Using Machine Learning: A Systematic Review." Electronics 10, no. 13 (2021): 1606. http://dx.doi.org/10.3390/electronics10131606.
Full textArti Deshpande. "Leveraging Signature Patterns and Machine Learning for Detecting HTTP Header Manipulation Attacks." Journal of Information Systems Engineering and Management 10, no. 9s (2025): 636–50. https://doi.org/10.52783/jisem.v10i9s.1290.
Full textBellizzi, Jennifer, Eleonora Losiouk, Mauro Conti, Christian Colombo, and Mark Vella. "VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics." Journal of Cybersecurity and Privacy 3, no. 3 (2023): 364–95. http://dx.doi.org/10.3390/jcp3030019.
Full textMujtaba, Ahmad, Mehrunisa Zulfiqar, Muhammad Umar Azhar, Sadaqat Ali, Asfar Ali, and Hamayun Khan. "ML-based Fileless Malware Threats Analysis for the Detection of Cyber security Attack based on Memory Forensics: A Survey." Asian Bulletin of Big Data Management 5, no. 1 (2025): 1–14. https://doi.org/10.62019/abbdm.v5i1.289.
Full textSuryati, One Tika, and Avon Budiono. "Impact Analysis of Malware Based on Call Network API With Heuristic Detection Method." International Journal of Advances in Data and Information Systems 1, no. 1 (2020): 8. http://dx.doi.org/10.25008/ijadis.v1i1.2.
Full textDuc Viet, Nguyen, and Dang Dinh Quan. "Proposing A New Approach for Detecting Malware Based on the Event Analysis Technique." International Journal of Innovative Technology and Exploring Engineering 12, no. 8 (2023): 21–27. http://dx.doi.org/10.35940/ijitee.h9651.0712823.
Full textMoussaileb, Routa, Nora Cuppens, Jean-Louis Lanet, and Hélène Le Bouder. "A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms." ACM Computing Surveys 54, no. 6 (2021): 1–36. http://dx.doi.org/10.1145/3453153.
Full textAMALRAJ VICTOIRE, Dr T. "Protecting Sensitive Data on USB Drives: An AI-Driven Solution for Malware Detection and Data Privacy." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04159.
Full textEhsan, Adeel, Cagatay Catal, and Alok Mishra. "Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review." Sensors 22, no. 20 (2022): 7928. http://dx.doi.org/10.3390/s22207928.
Full text