Journal articles on the topic 'Malware'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malware.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sehrawat, Sahil, and Dr Dinesh Singh. "Malware and Malware Detection Techniques: A Survey." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 3947–53. http://dx.doi.org/10.22214/ijraset.2022.43287.
Full textKrishna, T. Shiva Rama. "Malware Detection using Deep Learning." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1847–53. http://dx.doi.org/10.22214/ijraset.2021.35426.
Full textJoshi, Sakshi, and Santosh Mahagaonkar. "MALWARE DETECTION USING MACHINE LEARNING TECHNIQUES." International Journal of Engineering Applied Sciences and Technology 7, no. 5 (September 1, 2022): 86–91. http://dx.doi.org/10.33564/ijeast.2022.v07i05.014.
Full textMarcello, Mario. "Collecting Malware in Swiss German University with Low Energy and Cost Computer." Journal of Applied Information, Communication and Technology 5, no. 2 (October 28, 2018): 85–91. http://dx.doi.org/10.33555/ejaict.v5i2.57.
Full textWang, Shuo, Jian Wang, Yafei Song, and Song Li. "Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs." Computational Intelligence and Neuroscience 2021 (December 14, 2021): 1–10. http://dx.doi.org/10.1155/2021/1070586.
Full textBavishi, Ujaliben Kalpesh, and Bhavesh Madanlal Jain. "Malware Analysis." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 12 (January 3, 2018): 27. http://dx.doi.org/10.23956/ijarcsse.v7i12.507.
Full textIsmail, Ismahani, Sulaiman Mohd Nor, and Muhammad Nadzir Marsono. "Stateless Malware Packet Detection by Incorporating Naive Bayes with Known Malware Signatures." Applied Computational Intelligence and Soft Computing 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/197961.
Full textZhang, Yu, and Feng Xia. "A Self-Relocation Based Method for Malware Detection." Applied Mechanics and Materials 220-223 (November 2012): 2688–93. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2688.
Full textSrivastava, Prerna, and Mohan Raj. "Feature extraction for enhanced malware detection using genetic algorithm." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 444. http://dx.doi.org/10.14419/ijet.v7i2.8.10479.
Full textJohn Oluwafemi Ogun. "Advancements in automated malware analysis: evaluating the efficacy of open-source tools in detecting and mitigating emerging malware threats to US businesses." International Journal of Science and Research Archive 12, no. 2 (August 30, 2024): 1958–64. http://dx.doi.org/10.30574/ijsra.2024.12.2.1488.
Full textYan, Jinpei, Yong Qi, and Qifan Rao. "Detecting Malware with an Ensemble Method Based on Deep Neural Network." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/7247095.
Full textLiu, Yu, Kai Guo, Xiangdong Huang, Zhou Zhou, and Yichi Zhang. "Detecting Android Malwares with High-Efficient Hybrid Analyzing Methods." Mobile Information Systems 2018 (March 13, 2018): 1–12. http://dx.doi.org/10.1155/2018/1649703.
Full textPanwala, Harshitkumar R. "A Methodological Study on Malware Analysis." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (October 31, 2021): 450–52. http://dx.doi.org/10.22214/ijraset.2021.38416.
Full textFaruki, Parvez, Rati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun, and Rajendra Pamula. "A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks." Information 14, no. 7 (June 30, 2023): 374. http://dx.doi.org/10.3390/info14070374.
Full textSuryati, One Tika, and Avon Budiono. "Impact Analysis of Malware Based on Call Network API With Heuristic Detection Method." International Journal of Advances in Data and Information Systems 1, no. 1 (April 1, 2020): 1–8. http://dx.doi.org/10.25008/ijadis.v1i1.176.
Full textChintha, Prithvi, and Kakelli Anil Kumar. "EMERGING MACHINE LEARNING TECHNIQUES IN MALWARE DETECTION AND ANALYSIS: A COMPARATIVE ANALYSIS." International Journal of Advanced Research 8, no. 10 (October 31, 2020): 771–79. http://dx.doi.org/10.21474/ijar01/11900.
Full textAlrammal, Muath, Munir Naveed, and Georgios Tsaramirsis. "A Novel Monte-Carlo Simulation-Based Model for Malware Detection (eRBCM)." Electronics 10, no. 22 (November 22, 2021): 2881. http://dx.doi.org/10.3390/electronics10222881.
Full textM.Sunitha Reddy, Et al. "Exploiting And Estimating Malware Using Feature Impact Derived From API Call Sequence Learning." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (November 2, 2023): 1406–9. http://dx.doi.org/10.17762/ijritcc.v11i10.8684.
Full textBhaya, Wesam S., and Mustafa A. Ali. "Review on Malware and Malware Detection Using Data Mining Techniques." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 25, no. 5 (November 29, 2017): 1585–601. http://dx.doi.org/10.29196/jub.v25i5.104.
Full textChristopher ., L. U., and I. T. Ayorinde. "Malware Detection Using Hidden Markov Model." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (June 30, 2024): 37–46. http://dx.doi.org/10.22624/aims/digital/v11n2p4.
Full textAbdel Ouahab, Ikram Ben, Lotfi Elaachak, and Mohammed Bouhorma. "Improve malware classifiers performance using cost-sensitive learning for imbalanced dataset." IAES International Journal of Artificial Intelligence (IJ-AI) 12, no. 4 (December 1, 2023): 1836. http://dx.doi.org/10.11591/ijai.v12.i4.pp1836-1844.
Full textFazlali, Mahmood, Peyman Khodamoradi, Farhad Mardukhi, Masoud Nosrati, and Mohammad Mahdi Dehshibi. "Metamorphic malware detection using opcode frequency rate and decision tree." International Journal of Information Security and Privacy 10, no. 3 (July 2016): 67–86. http://dx.doi.org/10.4018/ijisp.2016070105.
Full textNaeem, Muhammad Rehan, Rashid Amin, Sultan S. Alshamrani, and Abdullah Alshehri. "Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition." Computational Intelligence and Neuroscience 2022 (April 21, 2022): 1–12. http://dx.doi.org/10.1155/2022/6294058.
Full textZou, Futai, Siyu Zhang, Weixiong Rao, and Ping Yi. "Detecting Malware Based on DNS Graph Mining." International Journal of Distributed Sensor Networks 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/102687.
Full textPachhala, Nagababu, Subbaiyan Jothilakshmi, and Bhanu Prakash Battula. "Android Malware Classification Using LSTM Model." Revue d'Intelligence Artificielle 36, no. 5 (December 23, 2022): 761–67. http://dx.doi.org/10.18280/ria.360514.
Full textJiao, Jian, Qiyuan Liu, Xin Chen, and Hongsheng Cao. "Behavior Intention Derivation of Android Malware Using Ontology Inference." Journal of Electrical and Computer Engineering 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/9250297.
Full textYildiz, Oktay, and Ibrahim Alper Doğru. "Permission-based Android Malware Detection System Using Feature Selection with Genetic Algorithm." International Journal of Software Engineering and Knowledge Engineering 29, no. 02 (February 2019): 245–62. http://dx.doi.org/10.1142/s0218194019500116.
Full textGarg, Umang, Santosh Kumar, and Manoj Kumar. "IHBOT: An Intelligent and Hybrid Model for Investigation and Classification of IoT Botnet." International Journal of Computer Network and Information Security 16, no. 5 (October 8, 2024): 98–112. http://dx.doi.org/10.5815/ijcnis.2024.05.08.
Full textFairbanks, Jeffrey, Andres Orbe, Christine Patterson, Edoardo Serra, and Marion Scheepers. "Identifying ATT&CK Tactics in Android Malware Control Flow Graph through Graph Representation Learning and Interpretability (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (June 28, 2022): 12941–42. http://dx.doi.org/10.1609/aaai.v36i11.21607.
Full textFarooq, Muhammad Shoaib, Zeeshan Akram, Atif Alvi, and Uzma Omer. "Role of Logistic Regression in Malware Detection: A Systematic Literature Review." VFAST Transactions on Software Engineering 10, no. 2 (May 15, 2022): 36–46. http://dx.doi.org/10.21015/vtse.v10i2.963.
Full textJoshi, Ankit, Komesh Borkar, Rohit Dhote, Saurabh Raut, Swapnil Thomare, Raghavendra Kulkarni, and Sharda Chhabria. "A Machine Learning Technique to Detect Malware." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 188–93. http://dx.doi.org/10.22214/ijraset.2022.47841.
Full textSharma, Divya. "Mobile Malware Detection using Machine Learning Classifiers." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 28, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem32180.
Full textAiyeniko, Olukayode, Aishat Oladayo Jimoh-Mahmud, Temitope Ayanladun Oyelakun, Stella Kehinde Ogunkan, and Oluwaseyi Inubiwon Oluwabukola. "Prediction of Malwares in Microsoft Windows Operating Systems." International Journal of Research and Innovation in Applied Science IX, no. VII (2024): 202–13. http://dx.doi.org/10.51584/ijrias.2024.907020.
Full textAlzahrani, Mohammad Eid. "Employing Incremental Learning for the Detection of Multiclass New Malware Variants." Indian Journal Of Science And Technology 17, no. 10 (March 1, 2024): 941–48. http://dx.doi.org/10.17485/ijst/v17i10.2862.
Full textAmer, Eslam, Shaker El-Sappagh, and Jong Wan Hu. "Contextual Identification of Windows Malware through Semantic Interpretation of API Call Sequence." Applied Sciences 10, no. 21 (October 30, 2020): 7673. http://dx.doi.org/10.3390/app10217673.
Full textTran, Kien, Hiroshi Sato, and Masao Kubo. "MANNWARE: A Malware Classification Approach with a Few Samples Using a Memory Augmented Neural Network." Information 11, no. 1 (January 17, 2020): 51. http://dx.doi.org/10.3390/info11010051.
Full textHindarto, Djarot, and Arko Djajadi. "Android-manifest extraction and labeling method for malware compilation and dataset creation." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (December 1, 2023): 6568. http://dx.doi.org/10.11591/ijece.v13i6.pp6568-6577.
Full textDener, Murat, Gökçe Ok, and Abdullah Orman. "Malware Detection Using Memory Analysis Data in Big Data Environment." Applied Sciences 12, no. 17 (August 27, 2022): 8604. http://dx.doi.org/10.3390/app12178604.
Full textJang, Jae-wook, and Huy Kang Kim. "Function-Oriented Mobile Malware Analysis as First Aid." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6707524.
Full textM, Geetha, Ramkumar R, Sarankumar C, Velmurugan K, and Boopathi N. "Online Network Protection Firmware for Malware Identification Utilizing Transformer Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (February 29, 2024): 110–13. http://dx.doi.org/10.22214/ijraset.2024.58280.
Full textPrima, B., and M. Bouhorma. "USING TRANSFER LEARNING FOR MALWARE CLASSIFICATION." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIV-4/W3-2020 (November 23, 2020): 343–49. http://dx.doi.org/10.5194/isprs-archives-xliv-4-w3-2020-343-2020.
Full textKumar, Rajeev, Mamdouh Alenezi, Md Ansari, Bineet Gupta, Alka Agrawal, and Raees Khan. "Evaluating the Impact of Malware Analysis Techniques for Securing Web Applications through a Decision-Making Framework under Fuzzy Environment." International Journal of Intelligent Engineering and Systems 13, no. 6 (December 31, 2020): 94–109. http://dx.doi.org/10.22266/ijies2020.1231.09.
Full textChamorro Palacios, Freddy Neptali, Edison Javier Guaña Moya, and Wilson Iván Sánchez Paredes. "Análisis de Memoria de Malware Ofuscado en el Conjunto de Datos CIC- MALMEM-2022." REVISTA MULTIDISCIPLINARIA DE DESARROLLO AGROPECUARIO, TECNOLÓGICO, EMPRESARIAL Y HUMANISTA. 6, no. 1 (February 24, 2024): 5. https://doi.org/10.61236/dateh.v6i1.870.
Full textNaeem, Hamad, Bandar M. Alshammari, and Farhan Ullah. "Explainable Artificial Intelligence-Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine-Tuned CNN-Based Transfer Learning Model." Computational Intelligence and Neuroscience 2022 (July 15, 2022): 1–17. http://dx.doi.org/10.1155/2022/7671967.
Full textNikhila, P. "Malwise-Malware Classification and Variant Extraction." IOSR Journal of Computer Engineering 13, no. 1 (2013): 61–66. http://dx.doi.org/10.9790/0661-1316166.
Full textBehera, Chandan Kumar, and D. Lalitha Bhaskari. "Malware Methodologies and Its Future." International Journal of Information Security and Privacy 11, no. 4 (October 2017): 47–64. http://dx.doi.org/10.4018/ijisp.2017100104.
Full textParajuli, Srijana, and Subarna Shakya. "Malware Detection and Classification Using Latent Semantic Indexing." Journal of Advanced College of Engineering and Management 4 (December 31, 2018): 153–61. http://dx.doi.org/10.3126/jacem.v4i0.23205.
Full textMuath Alrammal, Muath Alrammal, Munir Naveed Muath Alrammal, Suzan Sallam Munir Naveed, and Georgios Tsaramirsis Suzan Sallam. "A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing." 網際網路技術學刊 23, no. 7 (December 2022): 1651–61. http://dx.doi.org/10.53106/160792642022122307019.
Full textRahul Y. Pawar, Mr, and Dr C.Mahesh. "A Survey on Malware Detection Techniques on Linux Powered Smart Phones using Machine Learning Approaches." International Journal of Engineering & Technology 7, no. 3.34 (September 1, 2018): 8. http://dx.doi.org/10.14419/ijet.v7i3.34.18706.
Full textLee, Jaehyeong, Hyuk Jang, Sungmin Ha, and Yourim Yoon. "Android Malware Detection Using Machine Learning with Feature Selection Based on the Genetic Algorithm." Mathematics 9, no. 21 (November 5, 2021): 2813. http://dx.doi.org/10.3390/math9212813.
Full text