Academic literature on the topic 'Malware recognition'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malware recognition.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malware recognition"
Ibrahim, Laheeb M., Maisirreem Atheeed Kamal, and AbdulSattar A. Al-Alusi. "Hancitor malware recognition using swarm intelligent technique." Computer Science and Information Technologies 2, no. 3 (2020): 103–12. http://dx.doi.org/10.11591/csit.v2i3.p103-112.
Full textLaheeb M. Ibrahim, Maisirreem Atheeed Kamal, and AbdulSattar A. Al-Alusi. "Hancitor malware recognition using swarm intelligent technique." Computer Science and Information Technologies 2, no. 3 (2021): 103–12. http://dx.doi.org/10.11591/csit.v2i3.pp103-112.
Full textLaheeb, M. Ibrahim, Atheeed Kamal Maisirreem, and A. Al-Alusi AbdulSattar. "Hancitor malware recognition using swarm intelligent technique." Computer Science and Information Technologies 2, no. 3 (2021): 103–12. https://doi.org/10.11591/csit.v2i3.p103-112.
Full textMamoona Rafique Khan, Rana Muhammad Nadeem, Sadia Latif, and Rabia Tariq. "AN INVESTIGATION INTO THE APPLICATION OF DEEP CONVOLUTIONAL NEURAL NETWORKS FOR MALWARE DETECTION." Kashf Journal of Multidisciplinary Research 2, no. 04 (2025): 216–34. https://doi.org/10.71146/kjmr409.
Full textSyam, Gopi, Susan Jacob Evelyn, John Joel, Rajeev Raynell, and Alex Steve. "Malware Classification using Image Analysis." International Journal on Emerging Research Areas (IJERA) 05, no. 01 (2025): 178–82. https://doi.org/10.5281/zenodo.15289798.
Full textProf. C. Ranjeeth Kumar. "Malware Detection Using Remedimorbus Application." International Journal of New Practices in Management and Engineering 9, no. 01 (2020): 08–15. http://dx.doi.org/10.17762/ijnpme.v9i01.82.
Full textJing Li, Jing Li, and Xueping Luo Jing Li. "Malware Family Classification Based on Vision Transformer." 電腦學刊 34, no. 1 (2023): 087–99. http://dx.doi.org/10.53106/199115992023023401007.
Full textBruno, L. Sena Guilherme C. Paternezi Rhian Bottura Vinicius de Carvalho Bastos, Marise Miranda Dra, Americo Talarico Dr, and Domingos Sanches Esp. "WannaCry Malware Detection Using Bayesian Network Modeling." Sptech World Journal Vol 3, Edition 003 (2023): 21. https://doi.org/10.5281/zenodo.10511602.
Full textDube, Thomas E., Richard A. Raines, Michael R. Grimaila, Kenneth W. Bauer, and Steven K. Rogers. "Malware Target Recognition of Unknown Threats." IEEE Systems Journal 7, no. 3 (2013): 467–77. http://dx.doi.org/10.1109/jsyst.2012.2221913.
Full textUrzay, Iñaki. "Collective intelligence approaches to malware recognition." Network Security 2008, no. 5 (2008): 14–16. http://dx.doi.org/10.1016/s1353-4858(08)70065-5.
Full textDissertations / Theses on the topic "Malware recognition"
Redfern, Cory. "Malware Recognition by Properties of Executables." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/1013.
Full textDietrich, Christian [Verfasser], and Felix [Akademischer Betreuer] Freiling. "Identification and Recognition of Remote-Controlled Malware / Christian Dietrich. Betreuer: Felix Freiling." Mannheim : Universitätsbibliothek Mannheim, 2012. http://d-nb.info/1034490672/34.
Full textPrasse, Paul [Verfasser], and Tobias [Akademischer Betreuer] Scheffer. "Pattern recognition for computer security : discriminative models for email spam campaign and malware detection / Paul Prasse ; Betreuer: Tobias Scheffer." Potsdam : Universität Potsdam, 2016. http://d-nb.info/1218793066/34.
Full textMilkovič, Marek. "Systém pro detekci vzorů v binárních souborech." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363783.
Full textBook chapters on the topic "Malware recognition"
Kaur, Upinder, Xin Ma, Richard M. Voyles, and Byung-Cheol Min. "Malware Detection Using Pseudo Semi-Supervised Learning." In Pattern Recognition and Artificial Intelligence. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09282-4_31.
Full textMakandar, Aziz, and Anita Patrot. "Trojan Malware Image Pattern Classification." In Proceedings of International Conference on Cognition and Recognition. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5146-3_24.
Full textSun, Li, Steven Versteeg, Serdar Boztaş, and Trevor Yann. "Pattern Recognition Techniques for the Classification of Malware Packers." In Information Security and Privacy. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14081-5_23.
Full textGautam, Aparna, Rajesh Gopakumar, and G. Deepa. "Artificial Neural Network and Partial Pattern Recognition to Detect Malware." In Lecture Notes in Electrical Engineering. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3125-5_1.
Full textBiałczak, Piotr, and Wojciech Mazurczyk. "Malware Classification Using Open Set Recognition and HTTP Protocol Requests." In Computer Security – ESORICS 2023. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-51476-0_12.
Full textMoskalenko, Viacheslav. "Robust Model and Training Method for Malware Recognition in IoT Devices." In Advancements in Cybersecurity. CRC Press, 2025. https://doi.org/10.1201/9781003546153-13.
Full textKrupski, Jacek, Damian Rybicki, Waldemar Graniszewski, and Marcin Iwanowski. "Deep Learning vs. Traditional Approaches to Malware Traffic Classification – A Comparative Study." In Progress in Image Processing, Pattern Recognition and Communication Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81523-3_20.
Full textde los Santos, Sergio, Antonio Guzmán, and Carmen Torrano. "Android Malware Pattern Recognition for Fraud Detection and Attribution: A Case Study." In Encyclopedia of Social Network Analysis and Mining. Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4614-7163-9_110173-1.
Full textde los Santos, Sergio, Antonio Guzmán, and Carmen Torrano. "Android Malware Pattern Recognition for Fraud Detection and Attribution: A Case Study." In Encyclopedia of Social Network Analysis and Mining. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4939-7131-2_110173.
Full textTorky, Mohamed, Norhan Elnady, and Fahad Hanash Alzahrani. "Android Malware Recognition Using Machine Learning and Neural Networks Framework: A Practical Comparison Study." In Studies in Systems, Decision and Control. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-84636-6_57.
Full textConference papers on the topic "Malware recognition"
Zhernova, Ksenia. "Visual Malware Recognition Using Artificial Neural Networks." In 2024 International Russian Automation Conference (RusAutoCon). IEEE, 2024. http://dx.doi.org/10.1109/rusautocon61949.2024.10693982.
Full textDevika, P., V. Surya Narayana Reddy, Dhulipalla Ramya Krishna, Chiranjeevi Rampilla, and B. Simha Charan Yadav. "Malware Classification Using Deep Learning." In 2024 2nd International Conference on Artificial Intelligence Trends and Pattern Recognition (ICAITPR). IEEE, 2024. https://doi.org/10.1109/icaitpr63242.2024.10960019.
Full textZulmeika, Annisa Rifky, Marcellinus David Arel Bagjasantosa, Setia Juli Irzal Ismail, and Hendrawan. "Prevention Methods of Virtual Machine Environment Recognition by Malware." In 2024 18th International Conference on Telecommunication Systems, Services, and Applications (TSSA). IEEE, 2024. https://doi.org/10.1109/tssa63730.2024.10863873.
Full textVaishnavi, V. Siri, Sravani Reddy, Garshith Reddydy, Ramachandro Majji, Anudeep Medha, and A. Raja Shekar. "Malware Detection Using Long Short Term Memory and Recurrent Neural Network." In 2024 2nd International Conference on Artificial Intelligence Trends and Pattern Recognition (ICAITPR). IEEE, 2024. https://doi.org/10.1109/icaitpr63242.2024.10960175.
Full textBao, Pham Thai, Do Thi Thu Hien, Nguyen Tan Cam, and Van-Hau Pham. "A multimodal Windows malware detection method based on hybrid analysis and graph representations." In 2024 International Conference on Multimedia Analysis and Pattern Recognition (MAPR). IEEE, 2024. http://dx.doi.org/10.1109/mapr63514.2024.10660853.
Full textMohan, Mili, and Sabitha S. "Stegomalware: A Comprehensive Survey on Creation and Detection of Malware in Images." In 2024 2nd International Conference on Artificial Intelligence Trends and Pattern Recognition (ICAITPR). IEEE, 2024. https://doi.org/10.1109/icaitpr63242.2024.10960081.
Full textZhang, Yuxin, Shuilin Li, Gaolei Li, et al. "MKPL: Multi-dimensional Knowledge-embedded Prompt Learning for Few-shot Malware Family Recognition." In 2024 IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, 2024. https://doi.org/10.1109/hpcc64274.2024.00145.
Full textVokorokos, Liberios, Jan Hurtuk, and Branislav Mados. "Malware categorization and recognition problem." In 2014 18th International Conference on Intelligent Engineering Systems (INES). IEEE, 2014. http://dx.doi.org/10.1109/ines.2014.6909350.
Full textFedler, Rafael, Marcel Kulicke, and Julian Schutte. "An antivirus API for Android malware recognition." In 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE). IEEE, 2013. http://dx.doi.org/10.1109/malware.2013.6703688.
Full textStephen Fiske, Michael. "Visual Image Authentication." In Human Interaction and Emerging Technologies (IHIET-AI 2022) Artificial Intelligence and Future Applications. AHFE International, 2022. http://dx.doi.org/10.54941/ahfe100863.
Full text