Academic literature on the topic 'Malware Generation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malware Generation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malware Generation"
Alireza, Khalilian, Nourazar Amir, Vahidi-Asl Mojtaba, and Haghighi Hassan. "G3MD: Mining frequent opcode sub-graphs for metamorphic malware detection of existing families." Expert Systems with Applications 112 (December 7, 2019): 15–33. https://doi.org/10.5281/zenodo.3566150.
Full textLiang, Guanghui, Jianmin Pang, Zheng Shan, Runqing Yang, and Yihang Chen. "Automatic Benchmark Generation Framework for Malware Detection." Security and Communication Networks 2018 (September 6, 2018): 1–8. http://dx.doi.org/10.1155/2018/4947695.
Full textSingh, Avinash, Richard Adeyemi Ikuesan, and Hein Venter. "MalFe—Malware Feature Engineering Generation Platform." Computers 12, no. 10 (2023): 201. http://dx.doi.org/10.3390/computers12100201.
Full textBrezinski, Kenneth, and Ken Ferens. "Metamorphic Malware and Obfuscation: A Survey of Techniques, Variants, and Generation Kits." Security and Communication Networks 2023 (September 2, 2023): 1–41. http://dx.doi.org/10.1155/2023/8227751.
Full textDugyala, Raman, N. Hanuman Reddy, V. Uma Maheswari, Gouse Baig Mohammad, Fayadh Alenezi, and Kemal Polat. "Analysis of Malware Detection and Signature Generation Using a Novel Hybrid Approach." Mathematical Problems in Engineering 2022 (January 19, 2022): 1–13. http://dx.doi.org/10.1155/2022/5852412.
Full textPanduri, Bharathi, Madhurika Vummenthala, Spoorthi Jonnalagadda, Garwandha Ashwini, Naruvadi Nagamani, and Amanagati Akhila. "Dynamics and an efficient malware detection system using opcode sequence graph generation and ml algorithm." E3S Web of Conferences 184 (2020): 01009. http://dx.doi.org/10.1051/e3sconf/202018401009.
Full textBinh, Nguyen Thien. "Viral Logical Concept Analysis for Malware Conceptual Hierarchy Generation." International Journal of Machine Learning and Computing 7, no. 4 (2017): 49–54. http://dx.doi.org/10.18178/ijmlc.2017.7.4.619.
Full textDu, Yao, Mengtian Cui, and Xiaochun Cheng. "A Mobile Malware Detection Method Based on Malicious Subgraphs Mining." Security and Communication Networks 2021 (April 17, 2021): 1–11. http://dx.doi.org/10.1155/2021/5593178.
Full textBibi, Iram, Adnan Akhunzada, Jahanzaib Malik, Muhammad Khurram Khan, and Muhammad Dawood. "Secure Distributed Mobile Volunteer Computing with Android." ACM Transactions on Internet Technology 22, no. 1 (2022): 1–21. http://dx.doi.org/10.1145/3428151.
Full textZou, Futai, Linsen Li, Yue Wu, Jianhua Li, Siyu Zhang, and Kaida Jiang. "Detecting Domain-Flux Malware Using DNS Failure Traffic." International Journal of Software Engineering and Knowledge Engineering 28, no. 02 (2018): 151–73. http://dx.doi.org/10.1142/s0218194018400016.
Full textDissertations / Theses on the topic "Malware Generation"
Paleari, R. "DEALING WITH NEXT-GENERATION MALWARE." Doctoral thesis, Università degli Studi di Milano, 2011. http://hdl.handle.net/2434/155496.
Full textBerni, Simone. "Dragonfly: next generation sandbox." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/20894/.
Full textRudman, Lauren Lynne. "NetwIOC: a framework for the automated generation of network-based IOCS for malware information sharing and defence." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/60639.
Full textPark, Sean. "Neural malware detection." Thesis, Federation University Australia, 2019. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/173759.
Full textBláha, Lukáš. "Analýza automatizovaného generování signatur s využitím Honeypotu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236430.
Full textChen, Wei-Chih, and 陳威志. "Signature Generation for DLL-based Malware." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/69676859215084166694.
Full textChiu, Wei-Jhih, and 邱偉志. "Automated Malware Family Signature Generation based on Runtime API Call Sequence." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/etw684.
Full textAhluwalia, Aashna. "Impact study of length in detecting algorithmically generated domains." Thesis, 2018. https://dspace.library.uvic.ca//handle/1828/9299.
Full textHsueh, Chu-Yun, and 薛筑允. "Automated Generation and Semantic Analysis of System-state-change Activity Lifecycle of Malware Family." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/5676wn.
Full textTung, Wen-Shuo, and 董文碩. "An Android Malware Signature Generator Based on Control Flow Graphs." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/51984935564266523221.
Full textBooks on the topic "Malware Generation"
Sychev, Yuriy. Information protection and information security. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Full textMatrosov, Alex, Eugene Rodionov, and Sergey Bratus. Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats. No Starch Press, 2019.
Find full textSantos, Omar, Aaron Woland, and Panos Kampanakis. Cisco Next-Generation Security Solutions: All-In-one Cisco ASA Firepower Services, NGIPS, and AMP. Pearson Education, Limited, 2016.
Find full textHoward, Eric, Omar Santos, Andrae Middleton, Neal Humphrey, and Panos Kampanakis. Cisco Next-Generation Security Solutions: All-in-one Cisco ASA FirePOWER Services, NGIPS, and AMP. Pearson Education, Limited, 2016.
Find full textSantos, Omar, Aaron Woland, and Panos Kampanakis. Cisco Next-Generation Security Solutions: All-In-one Cisco ASA Firepower Services, NGIPS, and AMP. Pearson Education, Limited, 2016.
Find full textRajib, Nazmul. Cisco Firepower Threat Defense: Configuration and Troubleshooting Best Practices for the Next-Generation Firewall , Next-Generation Intrusion Prevention System , and Advanced Malware Protection. Pearson Education, Limited, 2017.
Find full textRajib, Nazmul. Cisco Firepower Threat Defense: Configuration and Troubleshooting Best Practices for the Next-Generation Firewall , Next-Generation Intrusion Prevention System , and Advanced Malware Protection. Pearson Education, Limited, 2017.
Find full textRajib, Nazmul. Cisco Firepower Threat Defense (FTD): Configuration and troubleshooting best practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP). 2018.
Find full textBook chapters on the topic "Malware Generation"
Tran, Quang Duy, and Fabio Di Troia. "Word Embeddings for Fake Malware Generation." In Silicon Valley Cybersecurity Conference. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-24049-2_2.
Full textTrehan, Harshit, and Fabio Di Troia. "Fake Malware Generation Using HMM and GAN." In Silicon Valley Cybersecurity Conference. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96057-5_1.
Full textWei, Yuheng, and Futai Zou. "Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90019-9_3.
Full textNaderi, Hassan, P. Vinod, Mauro Conti, Saeed Parsa, and Mohammad Hadi Alaeiyan. "Malware Signature Generation Using Locality Sensitive Hashing." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-7561-3_9.
Full textShin, Donghwi, Kwangwoo Lee, and Dongho Won. "Advanced Malware Variant Detection Algorithm Using Structural Characteristic of Executable File." In Future Generation Information Technology. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27142-7_35.
Full textGriffin, Kent, Scott Schneider, Xin Hu, and Tzi-cker Chiueh. "Automatic Generation of String Signatures for Malware Detection." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04342-0_6.
Full textZhao, Zixuan, Yan Wang, and Xiaorui Gong. "HAEPG: An Automatic Multi-hop Exploitation Generation Framework." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52683-2_5.
Full textWang, Tielei, Chengyu Song, and Wenke Lee. "Diagnosis and Emergency Patch Generation for Integer Overflow Exploits." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-08509-8_14.
Full textHai, Nguyen Minh, Mizuhito Ogawa, and Quan Thanh Tho. "Obfuscation Code Localization Based on CFG Generation of Malware." In Foundations and Practice of Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30303-1_14.
Full textXu, Zhaoyan, Jialong Zhang, Zhiqiang Lin, and Guofei Gu. "Malware Deception with Automatic Analysis and Generation of HoneyResource." In Autonomous Cyber Deception. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02110-8_11.
Full textConference papers on the topic "Malware Generation"
Shoniwa, Mufaro, Karel Veerabudren, and Mrinal Sharma. "AI-based Malware Threat Prediction through CNN-SVM Ensemble." In 2024 International Conference on Next Generation Computing Applications (NextComp). IEEE, 2024. https://doi.org/10.1109/nextcomp63004.2024.10779683.
Full textD M, Chandana, Mohan B A, Quitika Reddy P, and N. Murthy M S. "A Study on Next-Generation Malware Reverse Engineering Paradigms." In 2025 International Conference on Computing for Sustainability and Intelligent Future (COMP-SIF). IEEE, 2025. https://doi.org/10.1109/comp-sif65618.2025.10969866.
Full textD, Raghuraman, Soniya S, and Shivani S. "Automatic Android Malware Detection using CNN and GRU." In 2024 Third International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN). IEEE, 2024. http://dx.doi.org/10.1109/icstsn61422.2024.10671270.
Full textPrakash, Surbhi, and Amar Kumar Mohapatra. "AG-CSE Malware Shield: Adversarial Generation and Chaotic Stacked Ensemble Approach for Deep Learning-Based Malware Classification." In 2024 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS). IEEE, 2024. https://doi.org/10.1109/icuis64676.2024.10867045.
Full textObeegadoo, Parlan, and Girish Bekaroo. "Effective Detection of Fileless Malware: A Review and Comparative Analysis of Detection Techniques." In 2024 International Conference on Next Generation Computing Applications (NextComp). IEEE, 2024. https://doi.org/10.1109/nextcomp63004.2024.10779901.
Full textGalantucci, Stefano, Andrea Iannacone, Giuseppe Pirlo, Lucia Sarcinella, and Alessandro Stamerra. "MAGICIAN: Malware classification Approach through Generation Image using a Conditional and wassersteIn generative Adversarial Network variants." In 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC). IEEE, 2025. https://doi.org/10.1109/icaic63015.2025.10848615.
Full textG, Sweety Prasanna Kiruba, Shubha G. Sanu, K. Saranya, Tatiraju V. Rajani Kanth, and Mahesh S. "Dynamic Malware Classification and Signature Generation Using Multi-View Convolutional Neural Networks." In 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS). IEEE, 2024. https://doi.org/10.1109/iciics63763.2024.10859526.
Full textG, Shankar, Sridhar S, Srivatsan G, Kishan R, and Pranav Vikraman S S. "Enhancing Android Malware Detection Through Machine Learning: Insights From Permission and Metadata Analysis." In 2024 Third International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN). IEEE, 2024. http://dx.doi.org/10.1109/icstsn61422.2024.10670984.
Full textAl Balawi, Mohammad, Mohammad Alnabhan, and Mohammed S. Atoum. "Generative AI for Advanced Malware Detection." In 2024 4th Intelligent Cybersecurity Conference (ICSC). IEEE, 2024. https://doi.org/10.1109/icsc63108.2024.10895965.
Full textBittla, Srinivasa Rao, Abothar Mahmood, D. Kokila, Ayesha Siddiqua, and Ajitha P R. "Generative Adversarial Network Based Real-Time Malware Detection in Cloud Environments." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10967864.
Full textReports on the topic "Malware Generation"
Smith, Michael, Armida Carbajal, Eva Domschot, et al. MalGen: Malware Generation with Specific Behaviors to Improve Machine Learning-based Detectors. Office of Scientific and Technical Information (OSTI), 2022. http://dx.doi.org/10.2172/1893244.
Full text