Journal articles on the topic 'Malware fingerprint'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 24 journal articles for your research on the topic 'Malware fingerprint.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Botas, Alvaro, Ricardo J. Rodríguez, Vicente Matellan, Juan F. Garcia, M. T. Trobajo, and Miguel V. Carriegos. "On Fingerprinting of Public Malware Analysis Services." Logic Journal of the IGPL 28, no. 4 (2019): 473–86. http://dx.doi.org/10.1093/jigpal/jzz050.
Full textAhmed, Hashem El Fiky. "Visual Detection for Android Malware using Deep Learning." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 1 (2020): 152–56. https://doi.org/10.35940/ijitee.A8132.1110120.
Full textSingh, Jaiteg, Deepak Thakur, Farman Ali, Tanya Gera, and Kyung Sup Kwak. "Deep Feature Extraction and Classification of Android Malware Images." Sensors 20, no. 24 (2020): 7013. http://dx.doi.org/10.3390/s20247013.
Full textZhao, Jianming, Ziwen Jin, Peng Zeng, Chuan Sheng, and Tianyu Wang. "An Anomaly Detection Method for Oilfield Industrial Control Systems Fine-Tuned Using the Llama3 Model." Applied Sciences 14, no. 20 (2024): 9169. http://dx.doi.org/10.3390/app14209169.
Full textThomson, Amanda, Leandros Maglaras, and Naghmeh Moradpoor. "A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping." Future Internet 17, no. 3 (2025): 120. https://doi.org/10.3390/fi17030120.
Full textKlopper, Christiaan, and Jan Eloff. "Fingerprinting Network Sessions for the Discovery of Cyber Threats." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 171–80. http://dx.doi.org/10.34190/iccws.18.1.1027.
Full textBiałczak, Piotr, and Wojciech Mazurczyk. "Hfinger: Malware HTTP Request Fingerprinting." Entropy 23, no. 5 (2021): 507. http://dx.doi.org/10.3390/e23050507.
Full textNegera, Worku Gachena, Friedhelm Schwenker, Taye Girma Debelee, Henock Mulugeta Melaku, and Degaga Wolde Feyisa. "Lightweight Model for Botnet Attack Detection in Software Defined Network-Orchestrated IoT." Applied Sciences 13, no. 8 (2023): 4699. http://dx.doi.org/10.3390/app13084699.
Full textRafrastara, Fauzi Adi, Catur Supriyanto, Afinzaki Amiral, Syafira Rosa Amalia, Muhammad Daffa Al Fahreza, and Foez Ahmed. "Performance Comparison of k-Nearest Neighbor Algorithm with Various k Values and Distance Metrics for Malware Detection." JURNAL MEDIA INFORMATIKA BUDIDARMA 8, no. 1 (2024): 450. http://dx.doi.org/10.30865/mib.v8i1.6971.
Full textAlrabaee, Saed, Mourad Debbabi, and Lingyu Wang. "A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features." ACM Computing Surveys 55, no. 1 (2023): 1–41. http://dx.doi.org/10.1145/3486860.
Full textSrijita Bhattacharjee. "Enhancing System Security Through Signature-Based Ransomware Detection and Automated Data Backup: A Comprehensive Approach to Mitigating Ransomware Attacks." Advances in Nonlinear Variational Inequalities 28, no. 2 (2024): 136–52. http://dx.doi.org/10.52783/anvi.v28.1856.
Full textSheikh, Abdul Manan, Md Rafiqul Islam, Mohamed Hadi Habaebi, Suriza Ahmad Zabidi, Athaur Rahman Bin Najeeb, and Adnan Kabbani. "Integrating Physical Unclonable Functions with Machine Learning for the Authentication of Edge Devices in IoT Networks." Future Internet 17, no. 7 (2025): 275. https://doi.org/10.3390/fi17070275.
Full textSani, Ramadhan Rakhmat, Fauzi Adi Rafrastara, and Wildanil Ghozi. "Integrating Ensemble Learning and Information Gain for Malware Detection based on Static and Dynamic Features." Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, January 22, 2025. https://doi.org/10.22219/kinetik.v10i1.2051.
Full text"Visual Detection for Android Malware using Deep Learning." Regular 10, no. 1 (2020): 152–56. http://dx.doi.org/10.35940/ijitee.a8132.1110120.
Full textEsraa, Alshammari, H. Alhammami Alaa, and Hadi Ali. "Botnet Fingerprint Using Bro-IDS." October 1, 2020. https://doi.org/10.5281/zenodo.4130160.
Full textNappa, Antonio, Aaron Úbeda-Portugués, Panagiotis Papadopoulos, Matteo Varvello, Juan Tapiador, and Andrea Lanzi. "Scramblesuit: An effective timing side-channels framework for malware sandbox evasion." Journal of Computer Security, August 18, 2022, 1–26. http://dx.doi.org/10.3233/jcs-220005.
Full textKumar, Saurabh, Debadatta Mishra, Biswabandan Panda, and Sandeep Kumar Shukla. "InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems." Digital Threats: Research and Practice, October 12, 2022. http://dx.doi.org/10.1145/3567599.
Full textUllah, Farhan, Gautam Srivastava, and Shamsher Ullah. "A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization." Journal of Cloud Computing 11, no. 1 (2022). http://dx.doi.org/10.1186/s13677-022-00349-8.
Full textSrijita Bhattacharjee. "Identifying Ransomware Behaviour for Early Detection and Prevention: A Pre-Encryption Analysis Approach to Halt Cyber Invasions." Computer Fraud and Security, November 14, 2024, 59–66. https://doi.org/10.52710/cfs.35.
Full textIkwu, Ruth, Luca Giommoni, Amir Javed, Pete Burnap, and Matthew Williams. "Digital fingerprinting for identifying malicious collusive groups on Twitter." Journal of Cybersecurity 9, no. 1 (2023). http://dx.doi.org/10.1093/cybsec/tyad014.
Full textVasilellis, Efstratios, Thanos Katsiolis, Dimitris Gritzalis, George Stergiopoulos, and Christina Sotiriou. "The sound of malware: an audio fingerprinting malware detection method." International Journal of Information Security 24, no. 3 (2025). https://doi.org/10.1007/s10207-025-01073-5.
Full textHuber, Robert, Daniel Belles, Tim Bücher, Leonard Franke, Hussam Amrouch, and Uli Lemmer. "Integrated CPU Monitoring Using 2D Temperature Sensor Arrays Directly Printed on Heat Sinks." Advanced Materials Technologies, March 8, 2024. http://dx.doi.org/10.1002/admt.202301631.
Full textCeldrán, Alberto Huertas, Pedro Miguel Sánchez Sánchez, Miguel Azorín Castillo, Gérôme Bovet, Gregorio Martínez Pérez, and Burkhard Stiller. "Intelligent and behavioral-based detection of malware in IoT spectrum sensors." International Journal of Information Security, July 29, 2022. http://dx.doi.org/10.1007/s10207-022-00602-w.
Full textM.SUJITHRA1, AND DR G. PADMAVATHI. "BIOMETRIC SYSTEM PENETRATION IN RESOURCE CONSTRAINED MOBILE DEVICE." March 7, 2013. https://doi.org/10.5121/ijbb.2013.3104.
Full text