Journal articles on the topic 'Portable Executable'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Portable Executable.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Li, Yang, Ye Liang, and Jing Zhang Liang. "Applied-Information Technology with Trojan Horse Detection Method Based on C5.0 Decision Tree." Applied Mechanics and Materials 540 (April 2014): 439–42. http://dx.doi.org/10.4028/www.scientific.net/amm.540.439.
Full textDendere, Tanatswa Ruramai, and Avinash Singh. "Ransomware Detection Using Portable Executable Imports." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 66–74. http://dx.doi.org/10.34190/iccws.19.1.2031.
Full textGritzalis, Stefanos, George Aggelis, and Diomidis Spinellis. "Architectures for secure portable executable content." Internet Research 9, no. 1 (1999): 16–24. http://dx.doi.org/10.1108/10662249910251273.
Full textTuan, Nguyen Kim, Nguyen Hoang Ha, and Tran Truong Thien Nguyen. "DETECTING MALWARE IN PORTABLE EXECUTABLE FILES USING MACHINE LEARNING APPROACH." International Journal of Network Security & Its Applications (IJNSA) 14, no. 3 (2022): 11–17. https://doi.org/10.5281/zenodo.6629970.
Full textAhmed, Eman, Amin A. Sorrour, Mohamed A. Sobh, and Ayman M. Bahaa-Eldin. "A Cloud-based Malware Detection Framework." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (2017): 113. http://dx.doi.org/10.3991/ijim.v11i2.6577.
Full textAlqahtani, Ali, Sumayya Azzony, Leen Alsharafi, and Maha Alaseri. "Web-Based Malware Detection System Using Convolutional Neural Network." Digital 3, no. 3 (2023): 273–85. http://dx.doi.org/10.3390/digital3030017.
Full textDieta Wahyu Asry, Eko Siswanto, Dendy Kurniawan, and Haris Ihsanil Huda. "Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable." Teknik: Jurnal Ilmu Teknik dan Informatika 3, no. 1 (2023): 19–34. http://dx.doi.org/10.51903/teknik.v3i1.325.
Full textZhang, Shuhui, Changdong Hu, Lianhai Wang, Miodrag J. Mihaljevic, Shujiang Xu, and Tian Lan. "A Malware Detection Approach Based on Deep Learning and Memory Forensics." Symmetry 15, no. 3 (2023): 758. http://dx.doi.org/10.3390/sym15030758.
Full textTayyab, Umm-e.-Hani, Faiza Babar Khan, Asifullah Khan, Muhammad Hanif Durad, Farrukh Aslam Khan, and Aftab Ali. "ISAnWin: inductive generalized zero-shot learning using deep CNN for malware detection across windows and android platforms." PeerJ Computer Science 10 (December 23, 2024): e2604. https://doi.org/10.7717/peerj-cs.2604.
Full textKhammassi, N., I. Ashraf, J. V. Someren, et al. "OpenQL: A Portable Quantum Programming Framework for Quantum Accelerators." ACM Journal on Emerging Technologies in Computing Systems 18, no. 1 (2022): 1–24. http://dx.doi.org/10.1145/3474222.
Full textH. Al-Khshali, Hasan, та Muhammad Ilyas. "Impact of Portable Executable Header Features on Malware Detection燗ccuracy". Computers, Materials & Continua 74, № 1 (2023): 153–78. http://dx.doi.org/10.32604/cmc.2023.032182.
Full textPatil, Jeet. "Malware Detection of Portable Executable Using Machine Learning and Neural Networks." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 51–59. http://dx.doi.org/10.22214/ijraset.2023.57836.
Full textPatil, Jeet. "Malware Detection of Portable Executable Using Machine Learning and Neural Networks." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 51–59. http://dx.doi.org/10.22214/ijraset.2024.57836.
Full textS. Sai Nithish, V. Singvalliyappa, A. Sabarees, and V. Praveenkumar. "Detecting File based and Network (BGP) Based Anomalies Using Machine Learning for Enhanced Security." International Research Journal on Advanced Science Hub 7, no. 04 (2025): 269–77. https://doi.org/10.47392/irjash.2025.033.
Full textZhang, Yunchun, Jiaqi Jiang, Chao Yi, et al. "A Robust CNN for Malware Classification against Executable Adversarial Attack." Electronics 13, no. 5 (2024): 989. http://dx.doi.org/10.3390/electronics13050989.
Full textHilabi, Rawabi, and Ahmed Abu-Khadrah. "Windows operating system malware detection using machine learning." Bulletin of Electrical Engineering and Informatics 13, no. 5 (2024): 3401–10. http://dx.doi.org/10.11591/eei.v13i5.8018.
Full textDam, Tien Quang, Nghia Thinh Nguyen, Trung Viet Le, Tran Duc Le, Sylvestre Uwizeyemungu, and Thang Le-Dinh. "Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach." JUCS - Journal of Universal Computer Science 30, no. 2 (2024): 262–86. http://dx.doi.org/10.3897/jucs.104901.
Full textDam, Tien Quang, Nghia Thinh Nguyen, Trung Viet Le, Tran Duc Le, Sylvestre Uwizeyemungu, and Thang Le-Dinh. "Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach." JUCS - Journal of Universal Computer Science 30, no. (2) (2024): 262–86. https://doi.org/10.3897/jucs.104901.
Full textShiva Darshan, S. L., and C. D. Jaidhar. "Performance Evaluation of Filter-based Feature Selection Techniques in Classifying Portable Executable Files." Procedia Computer Science 125 (2018): 346–56. http://dx.doi.org/10.1016/j.procs.2017.12.046.
Full textKumar, Ajit, K. S. Kuppusamy, and G. Aghila. "A learning model to detect maliciousness of portable executable using integrated feature set." Journal of King Saud University - Computer and Information Sciences 31, no. 2 (2019): 252–65. http://dx.doi.org/10.1016/j.jksuci.2017.01.003.
Full textPenmatsa, Ravi Kiran Varma, Akhila Kalidindi, and S. Kumar Reddy Mallidi. "Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets." International Journal of Information Security and Privacy 14, no. 3 (2020): 95–114. http://dx.doi.org/10.4018/ijisp.2020070106.
Full textNamanya, Anitta Patience, Irfan U. Awan, Jules Pagna Disso, and Muhammad Younas. "Similarity hash based scoring of portable executable files for efficient malware detection in IoT." Future Generation Computer Systems 110 (September 2020): 824–32. http://dx.doi.org/10.1016/j.future.2019.04.044.
Full textSyeda, Durre Zehra, and Mamoona Naveed Asghar. "Dynamic Malware Classification and API Categorisation of Windows Portable Executable Files Using Machine Learning." Applied Sciences 14, no. 3 (2024): 1015. http://dx.doi.org/10.3390/app14031015.
Full textAula Hamed Naji Al-ojaimi. "Advanced Framework for Detecting Malware in Portable Executable (PE) Files Using a Multi-Model." Journal of Information Systems Engineering and Management 10, no. 36s (2025): 769–81. https://doi.org/10.52783/jisem.v10i36s.6562.
Full textJiang, Jian, and Fen Zhang. "Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System." Security and Communication Networks 2021 (July 7, 2021): 1–12. http://dx.doi.org/10.1155/2021/3578695.
Full textJawwad, Mohammad Hussein. "A Proposed System for Hiding Information In Portable Executable Files Based on Analyzing Import Section." IOSR Journal of Engineering 4, no. 1 (2014): 21–30. http://dx.doi.org/10.9790/3021-04172130.
Full textJang, Jiwon, and Daehee Jang. "Design and Countermeasures of PowerShell-based Attack Techniques to Bypass Portable Executable Image Detection Methods." Journal of KIISE 50, no. 9 (2023): 813–20. http://dx.doi.org/10.5626/jok.2023.50.9.813.
Full textAlzaidy, Sharoug, and Hamad Binsalleeh. "Adversarial Attacks with Defense Mechanisms on Convolutional Neural Networks and Recurrent Neural Networks for Malware Classification." Applied Sciences 14, no. 4 (2024): 1673. http://dx.doi.org/10.3390/app14041673.
Full textChoi, Sunoh. "Malicious Powershell Detection Using Graph Convolution Network." Applied Sciences 11, no. 14 (2021): 6429. http://dx.doi.org/10.3390/app11146429.
Full textt M.D.Shelar, t. M. D. Shelar, Aishwarya C. Ayare Aishwarya.C.Ayare, Trushna S. Bagade Trushna.S.Bagade, Shivashree P. Nimbalkar Shivashree.P.Nimbalkar, and Muskan A. Mujawar Muskan.A.Mujawar. "Multi-View Feature Fusion for Effective Malware Classification Using Deep Learning." International Journal of Pharmaceutical Research and Applications 10, no. 3 (2025): 1070–76. https://doi.org/10.35629/4494-100310701076.
Full textM.D.Shelar, M. D. Shelar, Aishwarya C. Ayare Aishwarya.C.Ayare, Trushna S. Bagade Trushna.S.Bagade, Shivashree P. Nimbalkar Shivashree.P.Nimbalkar, and Muskan A. Mujawar Muskan.A.Mujawar. "Multi-View Feature Fusion for Effective Malware Classification Using Deep Learning." International Journal of Advances in Engineering and Management 7, no. 6 (2025): 01–09. https://doi.org/10.35629/5252-07060109.
Full textRizvi, Syed Khurram Jah, Warda Aslam, Muhammad Shahzad, Shahzad Saleem, and Muhammad Moazam Fraz. "PROUD-MAL: static analysis-based progressive framework for deep unsupervised malware classification of windows portable executable." Complex & Intelligent Systems 8, no. 1 (2021): 673–85. http://dx.doi.org/10.1007/s40747-021-00560-1.
Full textJames, Peter, and Don Griffiths. "A secure portable execution environment to support teleworking." Information Management & Computer Security 22, no. 3 (2014): 309–30. http://dx.doi.org/10.1108/imcs-07-2013-0052.
Full textKattamuri, Santosh Jhansi, Ravi Kiran Varma Penmatsa, Sujata Chakravarty, and Venkata Sai Pavan Madabathula. "Swarm Optimization and Machine Learning Applied to PE Malware Detection towards Cyber Threat Intelligence." Electronics 12, no. 2 (2023): 342. http://dx.doi.org/10.3390/electronics12020342.
Full textCypto, J., G. Srikanth, K. Surya Prakash, and B. Gunal. "Intelligent Malware Classification Using PE File Metadata and Machine Learning Techniques." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 5742–50. https://doi.org/10.22214/ijraset.2025.69729.
Full textGo, Lance Jansen C., Ma Sheila A. Magboo, and Vincent Peter C. Magboo. "A Portable Executable Clinical Decision Support Tool for Pneumonia Classification using Average Probability on an Ensemble Model." Procedia Computer Science 218 (2023): 1591–600. http://dx.doi.org/10.1016/j.procs.2023.01.137.
Full textKotenko, Igor, Konstantin Izrailov, and Mikhail Buinevich. "The Method and Software Tool for Identification of the Machine Code Architecture in Cyberphysical Devices." Journal of Sensor and Actuator Networks 12, no. 1 (2023): 11. http://dx.doi.org/10.3390/jsan12010011.
Full textOktaviani, Anisa, and Melwin Syafrizal. "GandCrab Ransomware Analysis on Windows Using Static Method." Buletin Ilmiah Sarjana Teknik Elektro 3, no. 2 (2021): 163–75. http://dx.doi.org/10.12928/biste.v3i2.4884.
Full textIsmail, Hazim, Rio Guntur Utomo, and Marastika Wicaksono Aji Bawono. "Comparison of Support Vector Machine and Random Forest Method on Static Analysis Windows Portable Executable (PE) Malware Detection." JURNAL MEDIA INFORMATIKA BUDIDARMA 8, no. 1 (2024): 154. http://dx.doi.org/10.30865/mib.v8i1.7110.
Full textYehorov, Serhii, and Tetyana Shkvarnytska. "ADVANCED METHOD OF ANALYSIS OF MALICIOUS SOFTWARE FOR THE PURPOSE OF CREATING SIGNATURES." Visnyk Universytetu “Ukraina”, no. 1 (28) 2020 (2020): 161–70. http://dx.doi.org/10.36994/2707-4110-2020-1-28-14.
Full textToàn, Nguyễn Tấn, Vũ Thanh Nguyên, Trịnh Quốc Sơn та Lê Đình Tuấn. "Phương pháp phát hiện virus máy tính dựa trên hệ miễn dịch nhân tạo kết hợp thông tin từ cấu trúc PE của tập tin trên hệ điều hành Windows". Tạp chí Khoa học 15, № 12 (2019): 82. http://dx.doi.org/10.54607/hcmue.js.15.12.2321(2018).
Full textNoever, David A., and Samantha E. Miller Noever. "Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks." International Journal of Network Security & Its Applications 13, no. 03 (2021): 1–13. http://dx.doi.org/10.5121/ijnsa.2021.13301.
Full textYang, June Ho, and Yeonseung Ryu. "Design and Development of a Command-line Tool for Portable Executable File Analysis and Malware Detection in IoT Devices." International Journal of Security and Its Applications 9, no. 8 (2015): 127–36. http://dx.doi.org/10.14257/ijsia.2015.9.8.10.
Full textBaghirov, Elshan. "ADVANCED MACHINE LEARNING AND INTERPRETABILITY FOR WINDOWS MALWARE DETECTION." Journal of Modern Technology and Engineering 9, no. 3 (2024): 165–77. https://doi.org/10.62476/jmte93165.
Full textDavid, A. Noever, and E. Miller Noever Samantha. "DEEP LEARNING CLASSIFICATION METHODS APPLIED TO TABULAR CYBERSECURITY BENCHMARKS." International Journal of Network Security & Its Applications (IJNSA) 13, no. 3 (2021): 01–13. https://doi.org/10.5281/zenodo.4910770.
Full textDas, Pragya Paramita. "Malware Analysis Using Memory Forensics." International Journal for Research in Applied Science and Engineering Technology 10, no. 10 (2022): 488–95. http://dx.doi.org/10.22214/ijraset.2022.47021.
Full textBai, Jinrong, Junfeng Wang, and Guozhong Zou. "A Malware Detection Scheme Based on Mining Format Information." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/260905.
Full textMalik, Shairoze. "The Machine Learning in Malware Detection." International Journal for Electronic Crime Investigation 5, no. 3 (2022): 29–36. http://dx.doi.org/10.54692/ijeci.2022.050387.
Full textNguyễn Đức, Việt. "Hướng tiếp cận phát hiện mã độc dựa trên phân tích tĩnh kết hợp thuật toán học máy". Journal of Military Science and Technology 90 (25 жовтня 2023): 134–39. http://dx.doi.org/10.54939/1859-1043.j.mst.90.2023.134-139.
Full textRamesh Prasad Pokhrel. "Behavioral analysis of malware using sandboxing techniques." International Journal of Science and Research Archive 15, no. 3 (2025): 582–86. https://doi.org/10.30574/ijsra.2025.15.3.1781.
Full text