Journal articles on the topic 'Malware Generation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malware Generation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alireza, Khalilian, Nourazar Amir, Vahidi-Asl Mojtaba, and Haghighi Hassan. "G3MD: Mining frequent opcode sub-graphs for metamorphic malware detection of existing families." Expert Systems with Applications 112 (December 7, 2019): 15–33. https://doi.org/10.5281/zenodo.3566150.
Full textLiang, Guanghui, Jianmin Pang, Zheng Shan, Runqing Yang, and Yihang Chen. "Automatic Benchmark Generation Framework for Malware Detection." Security and Communication Networks 2018 (September 6, 2018): 1–8. http://dx.doi.org/10.1155/2018/4947695.
Full textSingh, Avinash, Richard Adeyemi Ikuesan, and Hein Venter. "MalFe—Malware Feature Engineering Generation Platform." Computers 12, no. 10 (2023): 201. http://dx.doi.org/10.3390/computers12100201.
Full textBrezinski, Kenneth, and Ken Ferens. "Metamorphic Malware and Obfuscation: A Survey of Techniques, Variants, and Generation Kits." Security and Communication Networks 2023 (September 2, 2023): 1–41. http://dx.doi.org/10.1155/2023/8227751.
Full textDugyala, Raman, N. Hanuman Reddy, V. Uma Maheswari, Gouse Baig Mohammad, Fayadh Alenezi, and Kemal Polat. "Analysis of Malware Detection and Signature Generation Using a Novel Hybrid Approach." Mathematical Problems in Engineering 2022 (January 19, 2022): 1–13. http://dx.doi.org/10.1155/2022/5852412.
Full textPanduri, Bharathi, Madhurika Vummenthala, Spoorthi Jonnalagadda, Garwandha Ashwini, Naruvadi Nagamani, and Amanagati Akhila. "Dynamics and an efficient malware detection system using opcode sequence graph generation and ml algorithm." E3S Web of Conferences 184 (2020): 01009. http://dx.doi.org/10.1051/e3sconf/202018401009.
Full textBinh, Nguyen Thien. "Viral Logical Concept Analysis for Malware Conceptual Hierarchy Generation." International Journal of Machine Learning and Computing 7, no. 4 (2017): 49–54. http://dx.doi.org/10.18178/ijmlc.2017.7.4.619.
Full textDu, Yao, Mengtian Cui, and Xiaochun Cheng. "A Mobile Malware Detection Method Based on Malicious Subgraphs Mining." Security and Communication Networks 2021 (April 17, 2021): 1–11. http://dx.doi.org/10.1155/2021/5593178.
Full textBibi, Iram, Adnan Akhunzada, Jahanzaib Malik, Muhammad Khurram Khan, and Muhammad Dawood. "Secure Distributed Mobile Volunteer Computing with Android." ACM Transactions on Internet Technology 22, no. 1 (2022): 1–21. http://dx.doi.org/10.1145/3428151.
Full textZou, Futai, Linsen Li, Yue Wu, Jianhua Li, Siyu Zhang, and Kaida Jiang. "Detecting Domain-Flux Malware Using DNS Failure Traffic." International Journal of Software Engineering and Knowledge Engineering 28, no. 02 (2018): 151–73. http://dx.doi.org/10.1142/s0218194018400016.
Full textKarim, Md Enamul, Andrew Walenstein, Arun Lakhotia, and Laxmi Parida. "Malware phylogeny generation using permutations of code." Journal in Computer Virology 1, no. 1-2 (2005): 13–23. http://dx.doi.org/10.1007/s11416-005-0002-9.
Full textPutri, Herika Andini, Nazel Djibran, and Rohmat Tulloh. "Implementation Of Next-Generation Firewalls To Protect Applications From Malware Attacks." Jurnal Indonesia Sosial Teknologi 4, no. 11 (2023): 1961–70. http://dx.doi.org/10.59141/jist.v4i11.797.
Full textChandel, Tanmay. "Review of Malware and Phishing in the Current and Next Generation of the Internet." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6499–502. http://dx.doi.org/10.22214/ijraset.2023.52927.
Full textJ., Ramya. "A Scalable Solution Partially Supervised Approach for Generation of Family Signatures against Android Malware." Journal of Android and IOS Applications and Testing 3, no. 3 (2018): 25–29. https://doi.org/10.5281/zenodo.1995240.
Full textDjufri, Faiz Iman, and Charles Lim. "Revealing and Sharing Malware Profile Using Malware Threat Intelligence Platform." ACMIT Proceedings 6, no. 1 (2021): 72–82. http://dx.doi.org/10.33555/acmit.v6i1.100.
Full textAslan, Ömer, Merve Ozkan-Okay, and Deepti Gupta. "A Review of Cloud-Based Malware Detection System: Opportunities, Advances and Challenges." European Journal of Engineering and Technology Research 6, no. 3 (2021): 1–8. http://dx.doi.org/10.24018/ejers.2021.6.3.2372.
Full textAslan, Ömer, Merve Ozkan-Okay, and Deepti Gupta. "A Review of Cloud-Based Malware Detection System: Opportunities, Advances and Challenges." European Journal of Engineering and Technology Research 6, no. 3 (2021): 1–8. http://dx.doi.org/10.24018/ejeng.2021.6.3.2372.
Full textYu, Chii Heng, and Ismahani Ismail. "Obfuscated Computer Malware Classification Based on Significant Opcode." ELEKTRIKA- Journal of Electrical Engineering 23, no. 2 (2024): 157–62. http://dx.doi.org/10.11113/elektrika.v23n2.565.
Full textZhang, Hong, Shigen Shen, Qiying Cao, Xiaojun Wu, and Shaofeng Liu. "Modeling and analyzing malware diffusion in wireless sensor networks based on cellular automaton." International Journal of Distributed Sensor Networks 16, no. 11 (2020): 155014772097294. http://dx.doi.org/10.1177/1550147720972944.
Full textPutri, Herika Andini, Rohmat Tulloh, and Nazel Djibran. "Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware." Jurnal Informatika Universitas Pamulang 8, no. 2 (2023): 322–29. http://dx.doi.org/10.32493/informatika.v8i2.33656.
Full textTong, Yu, Hao Liang, Hailong Ma, Shuai Zhang, and Xiaohan Yang. "A Survey on Reinforcement Learning-Driven Adversarial Sample Generation for PE Malware." Electronics 14, no. 12 (2025): 2422. https://doi.org/10.3390/electronics14122422.
Full textThanh, Cong Truong, and Ivan Zelinka. "A Survey on Artificial Intelligence in Malware as Next-Generation Threats." MENDEL 25, no. 2 (2019): 27–34. http://dx.doi.org/10.13164/mendel.2019.2.027.
Full textKamarudin, Nur Khairani, Ahmad Firdaus, Mohd Zamri Osman, et al. "The Rise of Deep Learning in Cyber Security: Bibliometric Analysis of Deep Learning and Malware." JOIV : International Journal on Informatics Visualization 8, no. 3 (2024): 1398. http://dx.doi.org/10.62527/joiv.8.3.1535.
Full textSatoh, Akihiro, Yutaka Fukuda, Gen Kitagata, and Yutaka Nakamura. "A Word-Level Analytical Approach for Identifying Malicious Domain Names Caused by Dictionary-Based DGA Malware." Electronics 10, no. 9 (2021): 1039. http://dx.doi.org/10.3390/electronics10091039.
Full textMester, Attila. "Malware Analysis and Static Call Graph Generation with Radare2." Studia Universitatis Babeș-Bolyai Informatica 68, no. 1 (2023): 5–20. http://dx.doi.org/10.24193/subbi.2023.1.01.
Full textHou, Ronghao, Dongjie Liu, Xiaobo Jin, Jian Weng, and Guanggang Geng. "A malware detection method with function parameters encoding and function dependency modeling." PeerJ Computer Science 11 (June 13, 2025): e2946. https://doi.org/10.7717/peerj-cs.2946.
Full textAslan, Ömer, Refik Samet, and Ömer Özgür Tanrıöver. "Using a Subtractive Center Behavioral Model to Detect Malware." Security and Communication Networks 2020 (February 27, 2020): 1–17. http://dx.doi.org/10.1155/2020/7501894.
Full textXuan, Bona, Jin Li, and Yafei Song. "SFCWGAN-BiTCN with Sequential Features for Malware Detection." Applied Sciences 13, no. 4 (2023): 2079. http://dx.doi.org/10.3390/app13042079.
Full textAbdullahi, S. M., A. Mohammed, R. Y. Ibrahim, and A. S. Shamsuddeen. "Detection of Algorithmically Generated Domain Names using Ensemble Machine Learning Technique." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 2 (2023): 27–34. http://dx.doi.org/10.22624/aims/csean-smart2023p4.
Full textDe Donno, Michele, Nicola Dragoni, Alberto Giaretta, and Angelo Spognardi. "DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation." Security and Communication Networks 2018 (2018): 1–30. http://dx.doi.org/10.1155/2018/7178164.
Full textSohrabi, Shirin, Octavian Udrea, and Anton Riabov. "Hypothesis Exploration for Malware Detection Using Planning." Proceedings of the AAAI Conference on Artificial Intelligence 27, no. 1 (2013): 883–89. http://dx.doi.org/10.1609/aaai.v27i1.8552.
Full textBotacin, Marcus, Hojjat Aghakhani, Stefano Ortolani, et al. "One Size Does Not Fit All." ACM Transactions on Privacy and Security 24, no. 2 (2021): 1–31. http://dx.doi.org/10.1145/3429741.
Full textNiu, Weina, Ting Li, Xiaosong Zhang, Teng Hu, Tianyu Jiang, and Heng Wu. "Using XGBoost to Discover Infected Hosts Based on HTTP Traffic." Security and Communication Networks 2019 (November 6, 2019): 1–11. http://dx.doi.org/10.1155/2019/2182615.
Full textShabtai, Asaf, Eitan Menahem, and Yuval Elovici. "F-Sign: Automatic, Function-Based Signature Generation for Malware." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 41, no. 4 (2011): 494–508. http://dx.doi.org/10.1109/tsmcc.2010.2068544.
Full textArbore, Andrea, and Vincenzo Antonio Fioriti. "Topological protection from the next generation malware: a survey." International Journal of Critical Infrastructures 9, no. 1/2 (2013): 52. http://dx.doi.org/10.1504/ijcis.2013.051603.
Full textSalehi, Zahra, Ashkan Sami, and Mahboobe Ghiasi. "Using feature generation from API calls for malware detection." Computer Fraud & Security 2014, no. 9 (2014): 9–18. http://dx.doi.org/10.1016/s1361-3723(14)70531-7.
Full textAbdurrachman, Fauzi, Bambang Suharjo, and Yudhi Biantoro. "Optimization of Malware Code Insertion Using MD5 Collision." Journal on Education 7, no. 2 (2025): 10124–34. https://doi.org/10.31004/joe.v7i2.7594.
Full textAwan, Mazhar Javed, Osama Ahmed Masood, Mazin Abed Mohammed, et al. "Image-Based Malware Classification Using VGG19 Network and Spatial Convolutional Attention." Electronics 10, no. 19 (2021): 2444. http://dx.doi.org/10.3390/electronics10192444.
Full textCara, Fabrizio, Michele Scalas, Giorgio Giacinto, and Davide Maiorca. "On the Feasibility of Adversarial Sample Creation Using the Android System API." Information 11, no. 9 (2020): 433. http://dx.doi.org/10.3390/info11090433.
Full textAlazab, Moutaz. "Automated Malware Detection in Mobile App Stores Based on Robust Feature Generation." Electronics 9, no. 3 (2020): 435. http://dx.doi.org/10.3390/electronics9030435.
Full textCatak, Ferhat Ozgur, Javed Ahmed, Kevser Sahinbas, and Zahid Hussain Khand. "Data augmentation based malware detection using convolutional neural networks." PeerJ Computer Science 7 (January 22, 2021): e346. http://dx.doi.org/10.7717/peerj-cs.346.
Full textIlić, Slaviša, Milan Gnjatović, Brankica Popović, and Nemanja Maček. "A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes: An end-user perspective." Vojnotehnicki glasnik 70, no. 2 (2022): 372–92. http://dx.doi.org/10.5937/vojtehg70-36196.
Full textRao, Sanaboyina Madhusudhana, Arpit Jain, PVSS Gangadhar, and Vinay Sowpati. "Intellectual Feature Ranking Model with Correlated Feature Set based Malware Detection in Cloud environment using Machine Learning." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 187–98. http://dx.doi.org/10.17762/ijritcc.v11i9.8334.
Full textHu, Zhanhui, Guangzhong Liu, Xinyu Xiang, Yanping Li, and Siqing Zhuang. "GSB: GNGS and SAG-BiGRU network for malware dynamic detection." PLOS ONE 19, no. 4 (2024): e0298809. http://dx.doi.org/10.1371/journal.pone.0298809.
Full textEmmah, Victor T., Chidiebere Ugwu, and Laeticia N. Onyejegbu. "An Enhanced Classification Model for Likelihood of Zero-Day Attack Detection and Estimation." European Journal of Electrical Engineering and Computer Science 5, no. 4 (2021): 69–75. http://dx.doi.org/10.24018/ejece.2021.5.4.350.
Full textT, Maheshwaran. "SECURING PDFS: AN INNOVATIVE LSTM ALGORITHM FOR IMAGE-BASED MALWARE DETECTION." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34090.
Full textKiran, Vadduri Uday. "HAVAE – An Advanced Approach for Malware Detection Using Deep Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 2740–46. http://dx.doi.org/10.22214/ijraset.2024.59303.
Full textMetcalf, Leigh, and Jonathan M. Spring. "The Ecosystem of Detection and Blocklisting of Domain Generation." Digital Threats: Research and Practice 2, no. 3 (2021): 1–22. http://dx.doi.org/10.1145/3423951.
Full textPeng, Xiaowei, Hequn Xian, Qian Lu, and Xiuqing Lu. "Semantics aware adversarial malware examples generation for black-box attacks." Applied Soft Computing 109 (September 2021): 107506. http://dx.doi.org/10.1016/j.asoc.2021.107506.
Full textTang, Cong, Jiangyong Shi, Yi Yang, and Yuexiang Yang. "Malware Detection Model Based on Deep Convolution Generation Adversarial Network." Journal of Physics: Conference Series 1738 (January 2021): 012110. http://dx.doi.org/10.1088/1742-6596/1738/1/012110.
Full text