Journal articles on the topic 'Malware recognition'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malware recognition.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ibrahim, Laheeb M., Maisirreem Atheeed Kamal, and AbdulSattar A. Al-Alusi. "Hancitor malware recognition using swarm intelligent technique." Computer Science and Information Technologies 2, no. 3 (2020): 103–12. http://dx.doi.org/10.11591/csit.v2i3.p103-112.
Full textLaheeb M. Ibrahim, Maisirreem Atheeed Kamal, and AbdulSattar A. Al-Alusi. "Hancitor malware recognition using swarm intelligent technique." Computer Science and Information Technologies 2, no. 3 (2021): 103–12. http://dx.doi.org/10.11591/csit.v2i3.pp103-112.
Full textLaheeb, M. Ibrahim, Atheeed Kamal Maisirreem, and A. Al-Alusi AbdulSattar. "Hancitor malware recognition using swarm intelligent technique." Computer Science and Information Technologies 2, no. 3 (2021): 103–12. https://doi.org/10.11591/csit.v2i3.p103-112.
Full textMamoona Rafique Khan, Rana Muhammad Nadeem, Sadia Latif, and Rabia Tariq. "AN INVESTIGATION INTO THE APPLICATION OF DEEP CONVOLUTIONAL NEURAL NETWORKS FOR MALWARE DETECTION." Kashf Journal of Multidisciplinary Research 2, no. 04 (2025): 216–34. https://doi.org/10.71146/kjmr409.
Full textSyam, Gopi, Susan Jacob Evelyn, John Joel, Rajeev Raynell, and Alex Steve. "Malware Classification using Image Analysis." International Journal on Emerging Research Areas (IJERA) 05, no. 01 (2025): 178–82. https://doi.org/10.5281/zenodo.15289798.
Full textProf. C. Ranjeeth Kumar. "Malware Detection Using Remedimorbus Application." International Journal of New Practices in Management and Engineering 9, no. 01 (2020): 08–15. http://dx.doi.org/10.17762/ijnpme.v9i01.82.
Full textJing Li, Jing Li, and Xueping Luo Jing Li. "Malware Family Classification Based on Vision Transformer." 電腦學刊 34, no. 1 (2023): 087–99. http://dx.doi.org/10.53106/199115992023023401007.
Full textBruno, L. Sena Guilherme C. Paternezi Rhian Bottura Vinicius de Carvalho Bastos, Marise Miranda Dra, Americo Talarico Dr, and Domingos Sanches Esp. "WannaCry Malware Detection Using Bayesian Network Modeling." Sptech World Journal Vol 3, Edition 003 (2023): 21. https://doi.org/10.5281/zenodo.10511602.
Full textDube, Thomas E., Richard A. Raines, Michael R. Grimaila, Kenneth W. Bauer, and Steven K. Rogers. "Malware Target Recognition of Unknown Threats." IEEE Systems Journal 7, no. 3 (2013): 467–77. http://dx.doi.org/10.1109/jsyst.2012.2221913.
Full textUrzay, Iñaki. "Collective intelligence approaches to malware recognition." Network Security 2008, no. 5 (2008): 14–16. http://dx.doi.org/10.1016/s1353-4858(08)70065-5.
Full textDube, T., R. Raines, G. Peterson, K. Bauer, M. Grimaila, and S. Rogers. "Malware target recognition via static heuristics." Computers & Security 31, no. 1 (2012): 137–47. http://dx.doi.org/10.1016/j.cose.2011.09.002.
Full textChethana, S. Patil, Bhagyashree Malipatil, A. Patil Mamata, Mamata, and Manali. "Malware Recognition Based on Semantic Behaviors Using Machine Learning Techniques." INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES 1, no. 3 (2023): 40–49. https://doi.org/10.5281/zenodo.8105359.
Full textMakandar, Aziz, and Anita Patrot. "Wavelet Statistical Feature based Malware Class Recognition and Classification using Supervised Learning Classifier." Oriental journal of computer science and technology 10, no. 2 (2017): 400–406. http://dx.doi.org/10.13005/ojcst/10.02.20.
Full textBen Ayed, Ahmed. "Permission Request Pattern Recognition in Android Malware Applications." International Journal of Strategic Information Technology and Applications 8, no. 1 (2017): 37–49. http://dx.doi.org/10.4018/ijsita.2017010103.
Full textMalik, Shairoze. "The Machine Learning in Malware Detection." International Journal for Electronic Crime Investigation 5, no. 3 (2022): 29–36. http://dx.doi.org/10.54692/ijeci.2022.050387.
Full textLi, Xue, Jinlong Fei, Jiangtao Xie, et al. "Open Set Recognition for Malware Traffic via Predictive Uncertainty." Electronics 12, no. 2 (2023): 323. http://dx.doi.org/10.3390/electronics12020323.
Full textMaulana, Reza, Deris Stiawan, and Rahmat Budiarto. "Detection of android malware with deep learning method using convolutional neural network model." Computer Science and Information Technologies 6, no. 1 (2025): 68–79. https://doi.org/10.11591/csit.v6i1.p68-79.
Full textM Nithish Kumar and K.Samson Paul. "ANDROID MALWARE DETECTION THROUGH INTELLIGENT PATTERN RECOGNITION USING DEEP LEARNING AND EQUILIBRIUM OPTIMIZATION." International Journal of Engineering Research and Science & Technology 21, no. 2 (2025): 432–48. https://doi.org/10.62643/ijerst.2025.v21.i2.pp432-448.
Full textAnand Sharma, Sunita Choudhary,. "Comparison study of Machine Learning Algorithm and Data Science based Machine Learning Algorithm Malware Detection." Mathematical Statistician and Engineering Applications 71, no. 3s (2022): 01–07. http://dx.doi.org/10.17762/msea.v71i3s.2.
Full textSuresh, Tilak, Deepika M S, Dr Anandaraj SP, and Dr Poornima S. "Optimal Malware Detection for Android." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 08 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem36908.
Full textQian, Liping, and Lin Cong. "Channel Features and API Frequency-Based Transformer Model for Malware Identification." Sensors 24, no. 2 (2024): 580. http://dx.doi.org/10.3390/s24020580.
Full textP, Vijayalakshmi, and Karthika D. "A COMPARATIVE STUDY ON CYBER SECURITY THREATS DETECTION IN INTERNET OF THINGS." ICTACT Journal on Communication Technology 12, no. 2 (2021): 2418–27. http://dx.doi.org/10.21917/ijct.2021.0358.
Full textCannarile, Angelo, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo, and Giuseppe Pirlo. "Comparing Deep Learning and Shallow Learning Techniques for API Calls Malware Prediction: A Study." Applied Sciences 12, no. 3 (2022): 1645. http://dx.doi.org/10.3390/app12031645.
Full textPatil, Vinay, Naveen Kumar M, Pawan Singh M, and Ashishika Singh. "Effectively Writing YARA Rules to Detect Malware." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 1265–73. https://doi.org/10.22214/ijraset.2025.66535.
Full textDavarasan, Aneesha, Joshua Samual, Kulothunkan Palansundram, and Aitizaz Ali. "A Comprehensive Review of Machine Learning Approaches for Android Malware Detection." Journal of Cyber Security and Risk Auditing 2024, no. 1 (2024): 39–60. https://doi.org/10.63180/jcsra.thestap.2024.1.5.
Full textPanduri, Bharathi, Madhurika Vummenthala, Spoorthi Jonnalagadda, Garwandha Ashwini, Naruvadi Nagamani, and Amanagati Akhila. "Dynamics and an efficient malware detection system using opcode sequence graph generation and ml algorithm." E3S Web of Conferences 184 (2020): 01009. http://dx.doi.org/10.1051/e3sconf/202018401009.
Full textS, VIJAYALAKSHMI. "INTELLIGENCE THREAT ANALYSIS AND MALWARE DETECTION." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem02953.
Full textAddanki, Sandhya Rani, Chintakrindi Jahnavi, Aaisani Amrutha, and Nagababu Pachhala. "Enhanced Malware Detection in Windows Applications Using Ensemble Learning Techniques." Journal of Engineering Research and Reports 27, no. 4 (2025): 94–100. https://doi.org/10.9734/jerr/2025/v27i41458.
Full textLi, Haodong, Xiao Cheng, Guohan Zhang, Guosheng Xu, Guoai Xu, and Haoyu Wang. "Mitigating Emergent Malware Label Noise in DNN-Based Android Malware Detection." Proceedings of the ACM on Software Engineering 2, FSE (2025): 1136–59. https://doi.org/10.1145/3715769.
Full textWei, Chaoxian, Qiang Li, Dong Guo, and Xiangyu Meng. "Toward Identifying APT Malware through API System Calls." Security and Communication Networks 2021 (December 9, 2021): 1–14. http://dx.doi.org/10.1155/2021/8077220.
Full textBharathi, Lavanya, and Shanthi Chandrabose. "Machine Learning-Based Malware Software Detection Based on Adaptive Gradient Support Vector Regression." International Journal of Safety and Security Engineering 12, no. 1 (2022): 39–45. http://dx.doi.org/10.18280/ijsse.120105.
Full textFrolov, Denys, and Andrii Matviychuk. "Conceptual approach to malware recognition based on machine learning techniques." Modeling and Information Systems in Economics, no. 102 (December 21, 2022): 184–202. http://dx.doi.org/10.33111/mise.102.15.
Full textTuncer, Turker, Fatih Ertam, and Sengul Dogan. "Automated malware recognition method based on local neighborhood binary pattern." Multimedia Tools and Applications 79, no. 37-38 (2020): 27815–32. http://dx.doi.org/10.1007/s11042-020-09376-6.
Full textS. Girirajan. "A Deep Learning Approach for Android Malware Detection Using Mixed Bytecode Images and Attention-Based ResNet." Journal of Information Systems Engineering and Management 10, no. 2s (2024): 296–316. https://doi.org/10.52783/jisem.v10i2s.319.
Full textLohani, Anuj. "Static Heuristics Classifiers as Pre-Filter for Malware Target Recognition (MATR)." American Journal of Networks and Communications 4, no. 3 (2015): 44. http://dx.doi.org/10.11648/j.ajnc.20150403.14.
Full textBarr, Stanley J., Samuel J. Cardman, and David M. Martin. "A boosting ensemble for the recognition of code sharing in malware." Journal in Computer Virology 4, no. 4 (2008): 335–45. http://dx.doi.org/10.1007/s11416-008-0087-z.
Full textKuk, Kristijan, Aleksandar Stanojević, Petar Čisar, et al. "Applications of Fuzzy Logic and Probabilistic Neural Networks in E-Service for Malware Detection." Axioms 13, no. 9 (2024): 624. http://dx.doi.org/10.3390/axioms13090624.
Full textYadav, Sonal. "A Survey on Ransomware Malware and Ransomware Detection Techniques." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (2022): 243–48. http://dx.doi.org/10.22214/ijraset.2022.39787.
Full textDinesha, H. A., and Devi Jayanthila. "Forensics: Cybercrime investigation analysis in social networks." i-manager's Journal on Data Science & Big Data Analytics 1, no. 2 (2023): 20. http://dx.doi.org/10.26634/jds.1.2.20377.
Full textQuist, Daniel A., and Lorie M. Liebrock. "Reversing Compiled Executables for Malware Analysis via Visualization." Information Visualization 10, no. 2 (2011): 117–26. http://dx.doi.org/10.1057/ivs.2010.11.
Full textLakshita, Varshney, and Amit Sharma Dr. "Safeguarding IoT: A Machine Learning Approach to Malware Detection." Career Point International Journal of Research (CPIJR) 4 (January 10, 2024): 84–97. https://doi.org/10.5281/zenodo.11291441.
Full textRajeev, Haritha, and Dr Midhun Chakkravarthy. "Detection of Malware using Phishing Alarm." Indian Journal of Artificial Intelligence and Neural Networking 3, no. 4 (2023): 1–4. http://dx.doi.org/10.54105/ijainn.a1077.124123.
Full textHaritha, Rajeev. "Detection of Malware using Phishing Alarm." Indian Journal of Artificial Intelligence and Neural Networking (IJAINN) 4, no. 1 (2023): 1–4. https://doi.org/10.54105/ijainn.A1077.124123.
Full textPalla, Tarun Ganesh, and Shahab Tayeb. "Intelligent Mirai Malware Detection for IoT Nodes." Electronics 10, no. 11 (2021): 1241. http://dx.doi.org/10.3390/electronics10111241.
Full textAnđelić, Nikola, Sandi Baressi Šegota, and Zlatan Car. "Improvement of Malicious Software Detection Accuracy through Genetic Programming Symbolic Classifier with Application of Dataset Oversampling Techniques." Computers 12, no. 12 (2023): 242. http://dx.doi.org/10.3390/computers12120242.
Full textWang, Ping, Hao-Cyuan Li, Hsiao-Chung Lin, Wen-Hui Lin, and Nian-Zu Xie. "A Transductive Zero-Shot Learning Framework for Ransomware Detection Using Malware Knowledge Graphs." Information 16, no. 6 (2025): 458. https://doi.org/10.3390/info16060458.
Full textCho, Young bok. "Malware classifier for dynamic deep learning algorithm." International Journal of Computational Vision and Robotics 11, no. 5 (2021): 486. http://dx.doi.org/10.1504/ijcvr.2021.10040486.
Full textCho, Young bok. "Malware classifier for dynamic deep learning algorithm." International Journal of Computational Vision and Robotics 11, no. 5 (2021): 486. http://dx.doi.org/10.1504/ijcvr.2021.117577.
Full textShi, Tongxin, Roy A. McCann, Ying Huang, Wei Wang, and Jun Kong. "Malware Detection for Internet of Things Using One-Class Classification." Sensors 24, no. 13 (2024): 4122. http://dx.doi.org/10.3390/s24134122.
Full textZhang, Sanfeng, Jiahao Wu, Mengzhe Zhang, and Wang Yang. "Dynamic Malware Analysis Based on API Sequence Semantic Fusion." Applied Sciences 13, no. 11 (2023): 6526. http://dx.doi.org/10.3390/app13116526.
Full text