Journal articles on the topic 'Malware similarity'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malware similarity.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chen, Yu-Hung, Jiann-Liang Chen, and Ren-Feng Deng. "Similarity-Based Malware Classification Using Graph Neural Networks." Applied Sciences 12, no. 21 (October 26, 2022): 10837. http://dx.doi.org/10.3390/app122110837.
Full textYANG, Yi, Pu-Rui SU, Ling-Yun YING, and Deng-Guo FENG. "Dependency-Based Malware Similarity Comparison Method." Journal of Software 22, no. 10 (October 25, 2011): 2438–53. http://dx.doi.org/10.3724/sp.j.1001.2011.03888.
Full textJang, Jae-wook, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, and Huy Kang Kim. "Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information." Digital Investigation 14 (September 2015): 17–35. http://dx.doi.org/10.1016/j.diin.2015.06.002.
Full textJang, Jae-wook, Hyunjae Kang, Jiyoung Woo, Aziz Mohaisen, and Huy Kang Kim. "Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information." Computers & Security 58 (May 2016): 125–38. http://dx.doi.org/10.1016/j.cose.2015.12.005.
Full textPavithra, J., and S. Selvakumara Samy. "An Adaptive Feature Centric XG Boost Ensemble Classifier Model for Improved Malware Detection and Classification." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 2s (December 31, 2022): 208–17. http://dx.doi.org/10.17762/ijritcc.v10i2s.5930.
Full textVenkatraman, Sitalakshmi, and Mamoun Alazab. "Use of Data Visualisation for Zero-Day Malware Detection." Security and Communication Networks 2018 (December 2, 2018): 1–13. http://dx.doi.org/10.1155/2018/1728303.
Full textShi, Hongbo, Tomoki Hamagami, Katsunari Yoshioka, Haoyuan Xu, Kazuhiro Tobe, and Shigeki Goto. "Structural classification and similarity measurement of malware." IEEJ Transactions on Electrical and Electronic Engineering 9, no. 6 (September 27, 2014): 621–32. http://dx.doi.org/10.1002/tee.22018.
Full textChen, Chia-Mei, and Shi-Hao Wang. "Advancing Malware Classification With an Evolving Clustering Method." International Journal of Applied Metaheuristic Computing 9, no. 3 (July 2018): 1–12. http://dx.doi.org/10.4018/ijamc.2018070101.
Full textFrenklach, Tatiana, Dvir Cohen, Asaf Shabtai, and Rami Puzis. "Android malware detection via an app similarity graph." Computers & Security 109 (October 2021): 102386. http://dx.doi.org/10.1016/j.cose.2021.102386.
Full textPark, Chan-Kyu, Hyong-Shik Kim, Tae Jin Lee, and Jae-Cheol Ryou. "Function partitioning methods for malware variant similarity comparison." Journal of the Korea Institute of Information Security and Cryptology 25, no. 2 (April 30, 2015): 321–30. http://dx.doi.org/10.13089/jkiisc.2015.25.2.321.
Full textZHAO, Bing-lin, Fu-dong LIU, Zheng SHAN, Yi-hang CHEN, and Jian LIU. "Graph Similarity Metric Using Graph Convolutional Network: Application to Malware Similarity Match." IEICE Transactions on Information and Systems E102.D, no. 8 (August 1, 2019): 1581–85. http://dx.doi.org/10.1587/transinf.2018edl8259.
Full textChoi, Sunoh. "Combined kNN Classification and Hierarchical Similarity Hash for Fast Malware Detection." Applied Sciences 10, no. 15 (July 28, 2020): 5173. http://dx.doi.org/10.3390/app10155173.
Full textBlack, Paul, Iqbal Gondal, Peter Vamplew, and Arun Lakhotia. "Function Similarity Using Family Context." Electronics 9, no. 7 (July 17, 2020): 1163. http://dx.doi.org/10.3390/electronics9071163.
Full textRinaldi, Aditia. "Implementasi Fuzzy Hashing untuk Signature Malware." Jurnal ULTIMA Computing 6, no. 1 (June 1, 2014): 33–38. http://dx.doi.org/10.31937/sk.v6i1.293.
Full textWrench, P., and B. Irwin. "Detecting Derivative Malware Samples Using Deobfuscation-Assisted Similarity Analysis." SAIEE Africa Research Journal 107, no. 2 (June 2016): 65–77. http://dx.doi.org/10.23919/saiee.2016.8531543.
Full textJoe, Woo-Jin, and Hyong-Shik Kim. "A Malware Variants Detection Method based on Behavior Similarity." Korean Institute of Smart Media 8, no. 4 (December 31, 2019): 25–32. http://dx.doi.org/10.30693/smj.2019.8.4.25.
Full textWang, Changguang, Ziqiu Zhao, Fangwei Wang, and Qingru Li. "A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet." Security and Communication Networks 2021 (January 5, 2021): 1–16. http://dx.doi.org/10.1155/2021/6658842.
Full textGopika, Bhardwaj, and Yadav Rashi. "Predicting the Spread of Malware Outbreaks Using Autoencoder Based Neutral Networks." MENDEL 25, no. 1 (June 24, 2019): 157–64. http://dx.doi.org/10.13164/mendel.2019.1.157.
Full textNdibanje, Bruce, Ki Kim, Young Kang, Hyun Kim, Tae Kim, and Hoon Lee. "Cross-Method-Based Analysis and Classification of Malicious Behavior by API Calls Extraction." Applied Sciences 9, no. 2 (January 10, 2019): 239. http://dx.doi.org/10.3390/app9020239.
Full textDaeef, Ammar Yahya, Ali Al-Naji, Ali K. Nahar, and Javaan Chahl. "Features Engineering to Differentiate between Malware and Legitimate Software." Applied Sciences 13, no. 3 (February 3, 2023): 1972. http://dx.doi.org/10.3390/app13031972.
Full textDaeef, Ammar Yahya, Ali Al-Naji, and Javaan Chahl. "Features Engineering for Malware Family Classification Based API Call." Computers 11, no. 11 (November 11, 2022): 160. http://dx.doi.org/10.3390/computers11110160.
Full textKumar, Rajesh, Xiaosong Zhang, Riaz Khan, and Abubakar Sharif. "Research on Data Mining of Permission-Induced Risk for Android IoT Devices." Applied Sciences 9, no. 2 (January 14, 2019): 277. http://dx.doi.org/10.3390/app9020277.
Full textYousefi-Azar, Mahmood, Len Hamey, Vijay Varadharajan, and Shiping Chen. "Byte2vec: Malware Representation and Feature Selection for Android." Computer Journal 63, no. 8 (November 17, 2019): 1125–38. http://dx.doi.org/10.1093/comjnl/bxz121.
Full textHan, KyoungSoo, BooJoong Kang, and Eul Gyu Im. "Malware Analysis Using Visualized Image Matrices." Scientific World Journal 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/132713.
Full textQasem, Abdullah, Sami Zhioua, and Karima Makhlouf. "Finding a Needle in a Haystack: The Traffic Analysis Version." Proceedings on Privacy Enhancing Technologies 2019, no. 2 (April 1, 2019): 270–90. http://dx.doi.org/10.2478/popets-2019-0030.
Full textHe, Gaofeng, Bingfeng Xu, Lu Zhang, and Haiting Zhu. "On-Device Detection of Repackaged Android Malware via Traffic Clustering." Security and Communication Networks 2020 (May 31, 2020): 1–19. http://dx.doi.org/10.1155/2020/8630748.
Full textNiu, Wei-Na, Jiao Xie, Xiao-Song Zhang, Chong Wang, Xin-Qiang Li, Rui-Dong Chen, and Xiao-Lei Liu. "HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis." Security and Communication Networks 2021 (April 7, 2021): 1–12. http://dx.doi.org/10.1155/2021/6653386.
Full textWei, Chaoxian, Qiang Li, Dong Guo, and Xiangyu Meng. "Toward Identifying APT Malware through API System Calls." Security and Communication Networks 2021 (December 9, 2021): 1–14. http://dx.doi.org/10.1155/2021/8077220.
Full textXu, Ming, Lingfei Wu, Shuhui Qi, Jian Xu, Haiping Zhang, Yizhi Ren, and Ning Zheng. "A similarity metric method of obfuscated malware using function-call graph." Journal of Computer Virology and Hacking Techniques 9, no. 1 (January 22, 2013): 35–47. http://dx.doi.org/10.1007/s11416-012-0175-y.
Full textHaq, Irfan Ul, and Juan Caballero. "A Survey of Binary Code Similarity." ACM Computing Surveys 54, no. 3 (June 2021): 1–38. http://dx.doi.org/10.1145/3446371.
Full textChu, Sung-Taek, HeeSeok Kim, Kwang-Hyuk Im, Kyu-Il Kim, and Chang-Ho Seo. "Development of a Performance Evaluation Model on Similarity Measurement Method of Malware." Journal of the Korea Contents Association 14, no. 10 (October 28, 2014): 32–40. http://dx.doi.org/10.5392/jkca.2014.14.10.032.
Full textCho, In Kyeom, and Eul Gyu Im. "Improvement of Performance of Malware Similarity Analysis by the Sequence Alignment Technique." KIISE Transactions on Computing Practices 21, no. 3 (March 15, 2015): 263–68. http://dx.doi.org/10.5626/ktcp.2015.21.3.263.
Full textJang, Eun-Gyeom, Sang Jun Lee, and Joong In Lee. "A Study on Similarity Comparison for File DNA-Based Metamorphic Malware Detection." Journal of the Korea Society of Computer and Information 19, no. 1 (January 29, 2014): 85–94. http://dx.doi.org/10.9708/jksci.2014.19.1.085.
Full textTaheri, Rahim, Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, and Mauro Conti. "Similarity-based Android malware detection using Hamming distance of static binary features." Future Generation Computer Systems 105 (April 2020): 230–47. http://dx.doi.org/10.1016/j.future.2019.11.034.
Full textRahim Khan, M. A., R. C. Tripathi, and Ajit Kumar. "Repacked android application detection using image similarity." Nexo Revista Científica 33, no. 01 (July 20, 2020): 190–99. http://dx.doi.org/10.5377/nexo.v33i01.10058.
Full textBerta, Katarina, Sasa Stojanovic, Milos Cvetanovic, and Zaharije Radivojevic. "Estimation of similarity between functions extracted from x86 executable files." Serbian Journal of Electrical Engineering 12, no. 2 (2015): 253–62. http://dx.doi.org/10.2298/sjee1502253b.
Full textYamany, Bahaa, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki, and Marianne A. Azer. "A New Scheme for Ransomware Classification and Clustering Using Static Features." Electronics 11, no. 20 (October 14, 2022): 3307. http://dx.doi.org/10.3390/electronics11203307.
Full textNamanya, Anitta Patience, Irfan U. Awan, Jules Pagna Disso, and Muhammad Younas. "Similarity hash based scoring of portable executable files for efficient malware detection in IoT." Future Generation Computer Systems 110 (September 2020): 824–32. http://dx.doi.org/10.1016/j.future.2019.04.044.
Full textTurnip, Togu Novriansyah, Pratiwi Okuli Manik, Jhon Harry Tampubolon, and Patota Adi Petro Siahaan. "Klasifikasi Aplikasi Android menggunakan Algoritme K-Means dan Convolutional Neural Network berdasarkan Permission." Jurnal Teknologi Informasi dan Ilmu Komputer 7, no. 2 (February 18, 2020): 399. http://dx.doi.org/10.25126/jtiik.2020702641.
Full textTorabi, Sadegh, Mirabelle Dib, Elias Bou-Harb, Chadi Assi, and Mourad Debbabi. "A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships." IEEE Networking Letters 3, no. 3 (September 2021): 161–65. http://dx.doi.org/10.1109/lnet.2021.3076600.
Full textParres-Peredo, Alvaro, Ivan Piza-Davila, and Francisco Cervantes. "Unexpected-Behavior Detection Using TopK Rankings for Cybersecurity." Applied Sciences 9, no. 20 (October 17, 2019): 4381. http://dx.doi.org/10.3390/app9204381.
Full textNICHEPORUK, A., A. NICHEPORUK, I. NEGA, Y. NICHEPORUK, and A. KAZANTSEV. "INFORMATION TECHNOLOGY FOR DETECTING METAMORPHIC VIRUSES BASED ON THE ANALYSIS OF THE BEHAVIOR OF APPLICATIONS IN THE CORPORATE NETWORK." Computer Systems and Information Technologies 1, no. 1 (September 2, 2020): 60–67. http://dx.doi.org/10.31891/csit-2020-1-8.
Full textYavneh, Amir, Roy Lothan, and Dan Yamin. "Co-similar malware infection patterns as a predictor of future risk." PLOS ONE 16, no. 3 (March 29, 2021): e0249273. http://dx.doi.org/10.1371/journal.pone.0249273.
Full textPan, Zulie, Taiyan Wang, Lu Yu, and Yintong Yan. "Position Distribution Matters: A Graph-Based Binary Function Similarity Analysis Method." Electronics 11, no. 15 (August 5, 2022): 2446. http://dx.doi.org/10.3390/electronics11152446.
Full textChoi, Sunoh. "Malicious Powershell Detection Using Graph Convolution Network." Applied Sciences 11, no. 14 (July 12, 2021): 6429. http://dx.doi.org/10.3390/app11146429.
Full textBotacin, Marcus, Vitor Hugo Galhardo Moia, Fabricio Ceschin, Marco A. Amaral Henriques, and André Grégio. "Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios." Forensic Science International: Digital Investigation 38 (September 2021): 301220. http://dx.doi.org/10.1016/j.fsidi.2021.301220.
Full textHai, Nguyen Minh. "A STATISTICAL APPROACH FOR PACKER IDENTIFICATION." Vietnam Journal of Science and Technology 54, no. 3A (March 20, 2018): 129. http://dx.doi.org/10.15625/2525-2518/54/3a/11966.
Full textBukhanov, D. G., V. M. Polyakov, and M. A. Redkina. "Detection of malware using an artificial neural network based on adaptive resonant theory." Prikladnaya Diskretnaya Matematika, no. 52 (2021): 69–82. http://dx.doi.org/10.17223/20710410/52/4.
Full textArslan, Recep Sinan. "FG-Droid: Grouping based feature size reduction for Android malware detection." PeerJ Computer Science 8 (July 14, 2022): e1043. http://dx.doi.org/10.7717/peerj-cs.1043.
Full textWang, Yan, Peng Jia, Cheng Huang, Jiayong Liu, and Peisong He. "Hierarchical Attention Graph Embedding Networks for Binary Code Similarity against Compilation Diversity." Security and Communication Networks 2021 (August 10, 2021): 1–19. http://dx.doi.org/10.1155/2021/9954520.
Full text