Journal articles on the topic 'Zero-day malware attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 46 journal articles for your research on the topic 'Zero-day malware attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bhaya, Wesam S., and Mustafa A. Ali. "Review on Malware and Malware Detection Using Data Mining Techniques." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 25, no. 5 (November 29, 2017): 1585–601. http://dx.doi.org/10.29196/jub.v25i5.104.
Full textEmmah, Victor T., Chidiebere Ugwu, and Laeticia N. Onyejegbu. "An Enhanced Classification Model for Likelihood of Zero-Day Attack Detection and Estimation." European Journal of Electrical Engineering and Computer Science 5, no. 4 (August 19, 2021): 69–75. http://dx.doi.org/10.24018/ejece.2021.5.4.350.
Full textKrishna, T. Shiva Rama. "Malware Detection using Deep Learning." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1847–53. http://dx.doi.org/10.22214/ijraset.2021.35426.
Full textTran, Hiep, Enrique Campos-Nanez, Pavel Fomin, and James Wasek. "Cyber resilience recovery model to combat zero-day malware attacks." Computers & Security 61 (August 2016): 19–31. http://dx.doi.org/10.1016/j.cose.2016.05.001.
Full textTayyab, Umm-e.-Hani, Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan, and Yeon Soo Lee. "A Survey of the Recent Trends in Deep Learning Based Malware Detection." Journal of Cybersecurity and Privacy 2, no. 4 (September 28, 2022): 800–829. http://dx.doi.org/10.3390/jcp2040041.
Full textCheng, Binlin, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, and Haiqing Hai. "MoG: Behavior-Obfuscation Resistance Malware Detection." Computer Journal 62, no. 12 (June 4, 2019): 1734–47. http://dx.doi.org/10.1093/comjnl/bxz033.
Full textPriya, P. Mohana, and Abhijit Ranganathan. "Cyber Awareness Learning Imitation Environment (CALIE): A Card Game to provide Cyber Security Awareness for Various Group of Practitioners." International Journal of Advanced Networking and Applications 14, no. 02 (2022): 5334–41. http://dx.doi.org/10.35444/ijana.2022.14203.
Full textBalaji K. M. and Subbulakshmi T. "Malware Analysis Using Classification and Clustering Algorithms." International Journal of e-Collaboration 18, no. 1 (January 2022): 1–26. http://dx.doi.org/10.4018/ijec.290290.
Full textOPRIȘ, Cristian. "Cybercrime Evolution and Current Threats." International Journal of Information Security and Cybercrime 11, no. 1 (June 28, 2022): 41–48. http://dx.doi.org/10.19107/ijisc.2022.01.05.
Full textKim, Dohoon, Donghee Choi, and Jonghyun Jin. "Method for Detecting Core Malware Sites Related to Biomedical Information Systems." Computational and Mathematical Methods in Medicine 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/756842.
Full textBelaissaoui, Mustapha, and József Jurassec. "A Deep Convolutional Neural Network for Image Malware Classification." International Journal of Smart Security Technologies 6, no. 1 (January 2019): 49–60. http://dx.doi.org/10.4018/ijsst.2019010104.
Full textYeboah, Paul Ntim, Stephen Kweku Amuquandoh, and Haruna Balle Baz Musah. "Malware Detection Using Ensemble N-gram Opcode Sequences." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 19–31. http://dx.doi.org/10.3991/ijim.v15i24.25401.
Full textDRĂGHICESCU, Dragoș, Alexandru CARANICA, and Octavian FRATU. "HONEYPOT TECHNOLOGIES FOR MALWARE DETECTION AND ANALYSIS." STRATEGIES XXI - Command and Staff College 17, no. 1 (August 12, 2021): 265–71. http://dx.doi.org/10.53477/2668-2028-21-34.
Full textS, Preetha, P. Lalasa, and Pradeepa R. "A Comprehensive Overview on Cybersecurity: Threats and Attacks." Regular issue 10, no. 8 (June 30, 2021): 98–106. http://dx.doi.org/10.35940/ijitee.h9242.0610821.
Full textAboaoja, Faitouri A., Anazida Zainal, Fuad A. Ghaleb, Bander Ali Saleh Al-rimy, Taiseer Abdalla Elfadil Eisa, and Asma Abbas Hassan Elnour. "Malware Detection Issues, Challenges, and Future Directions: A Survey." Applied Sciences 12, no. 17 (August 25, 2022): 8482. http://dx.doi.org/10.3390/app12178482.
Full textSamantray, Om Prakash, and Satya Narayan Tripathy. "An Opcode-Based Malware Detection Model Using Supervised Learning Algorithms." International Journal of Information Security and Privacy 15, no. 4 (October 2021): 18–30. http://dx.doi.org/10.4018/ijisp.2021100102.
Full textNkongolo, Mike, Jacobus Philippus van Deventer, and Sydney Mambwe Kasongo. "UGRansome1819: A Novel Dataset for Anomaly Detection and Zero-Day Threats." Information 12, no. 10 (September 30, 2021): 405. http://dx.doi.org/10.3390/info12100405.
Full textSewak, Mohit, Sanjay K. Sahay, and Hemant Rathore. "DRLDO A Novel DRL based De obfuscation System for Defence Against Metamorphic Malware." Defence Science Journal 71, no. 1 (February 1, 2021): 55–65. http://dx.doi.org/10.14429/dsj.71.15780.
Full textNAKAO, Koji, Daisuke INOUE, Masashi ETO, and Katsunari YOSHIOKA. "Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring." IEICE Transactions on Information and Systems E92-D, no. 5 (2009): 787–98. http://dx.doi.org/10.1587/transinf.e92.d.787.
Full textČeponis, Dainius, and Nikolaj Goranin. "Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD." Security and Communication Networks 2019 (November 11, 2019): 1–12. http://dx.doi.org/10.1155/2019/2317976.
Full textHamad, Mohammad, Zain A. H. Hammadeh, Selma Saidi, and Vassilis Prevelakis. "Temporal-based intrusion detection for IoV." it - Information Technology 62, no. 5-6 (December 16, 2020): 227–39. http://dx.doi.org/10.1515/itit-2020-0009.
Full textSingh, Raman, Harish Kumar, Ravinder Kumar Singla, and Ramachandran Ramkumar Ketti. "Internet attacks and intrusion detection system." Online Information Review 41, no. 2 (April 10, 2017): 171–84. http://dx.doi.org/10.1108/oir-12-2015-0394.
Full textPark, Jong Hyuk. "Symmetry-Adapted Machine Learning for Information Security." Symmetry 12, no. 6 (June 22, 2020): 1044. http://dx.doi.org/10.3390/sym12061044.
Full textMarhusin, Fadzli, and Christopher John Lokan. "A Preemptive Behaviour-based Malware Detection through Analysis of API Calls Sequence Inspired by Human Immune System." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 113. http://dx.doi.org/10.14419/ijet.v7i4.15.21431.
Full textLi, Wei, Peng Liu, and Hao Chen. "Research and Implementation of Malicious Code Behavior Analysis." Applied Mechanics and Materials 182-183 (June 2012): 1938–42. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.1938.
Full textUmar, Rusydi, Imam Riadi, and Ridho Surya Kusuma. "Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method." IJID (International Journal on Informatics for Development) 10, no. 1 (June 30, 2021): 53–61. http://dx.doi.org/10.14421/ijid.2021.2423.
Full textKhraisat, Ansam, Iqbal Gondal, Peter Vamplew, Joarder Kamruzzaman, and Ammar Alazab. "Hybrid Intrusion Detection System Based on the Stacking Ensemble of C5 Decision Tree Classifier and One Class Support Vector Machine." Electronics 9, no. 1 (January 17, 2020): 173. http://dx.doi.org/10.3390/electronics9010173.
Full textDemertzis, Konstantinos, Konstantinos Tsiknas, Dimitrios Takezis, Charalabos Skianis, and Lazaros Iliadis. "Darknet Traffic Big-Data Analysis and Network Management for Real-Time Automating of the Malicious Intent Detection Process by a Weight Agnostic Neural Networks Framework." Electronics 10, no. 7 (March 25, 2021): 781. http://dx.doi.org/10.3390/electronics10070781.
Full textAl-Rushdan, Huthifh, Mohammad Shurman, and Sharhabeel Alnabelsi. "On Detection and Prevention of Zero-Day Attack Using Cuckoo Sandbox in Software-Defined Networks." International Arab Journal of Information Technology 17, no. 4A (July 31, 2020): 662–70. http://dx.doi.org/10.34028/iajit/17/4a/11.
Full textSingh, Abhay Pratap. "A Study on Zero Day Malware Attack." IJARCCE 6, no. 1 (January 30, 2017): 391–92. http://dx.doi.org/10.17148/ijarcce.2017.6179.
Full textDemertzis, Konstantinos, Panayiotis Kikiras, Nikos Tziritas, Salvador Sanchez, and Lazaros Iliadis. "The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence." Big Data and Cognitive Computing 2, no. 4 (November 22, 2018): 35. http://dx.doi.org/10.3390/bdcc2040035.
Full textVenkatraman, Sitalakshmi, and Mamoun Alazab. "Use of Data Visualisation for Zero-Day Malware Detection." Security and Communication Networks 2018 (December 2, 2018): 1–13. http://dx.doi.org/10.1155/2018/1728303.
Full textMala, V., and K. Meena. "Hybrid classification model to detect advanced intrusions using data mining techniques." International Journal of Engineering & Technology 7, no. 2.4 (March 10, 2018): 10. http://dx.doi.org/10.14419/ijet.v7i2.4.10031.
Full textVerma, Sushma, and S. K. Muttoo. "An Android Malware Detection Framework-based on Permissions and Intents." Defence Science Journal 66, no. 6 (October 31, 2016): 618. http://dx.doi.org/10.14429/dsj.66.10803.
Full textAlshamrani, Sultan S. "Design and Analysis of Machine Learning Based Technique for Malware Identification and Classification of Portable Document Format Files." Security and Communication Networks 2022 (September 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/7611741.
Full textFeng, Bo, Qiang Li, Yuede Ji, Dong Guo, and Xiangyu Meng. "Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users." Security and Communication Networks 2019 (July 11, 2019): 1–14. http://dx.doi.org/10.1155/2019/3053418.
Full textSelján, Gábor. "The Remarkable 10th Anniversary of Stuxnet." Academic and Applied Research in Military and Public 19, no. 3 (2020): 85–98. http://dx.doi.org/10.32565/aarms.2020.3.6.
Full text"Leveraging Machine Learning Algorithms For Zero-Day Ransomware Attack." International Journal of Engineering and Advanced Technology 8, no. 6 (August 30, 2019): 4104–7. http://dx.doi.org/10.35940/ijeat.f8694.088619.
Full textBen abdel ouahab, Ikram, Mohammed Bouhorma, Lotfi El Aachak, and Anouar Abdelhakim Boudhir. "Towards a new Cyberdefense generation: Proposition of an Intelligent Cybersecurity Framework for malware attacks." Recent Advances in Computer Science and Communications 13 (November 17, 2020). http://dx.doi.org/10.2174/2666255813999201117093512.
Full text"Improving Malware Detection Classification Accuracy with Feature Selection Methods and Ensemble-based Machine Learning Methods." International Journal of Innovative Technology and Exploring Engineering 9, no. 2 (December 10, 2019): 2055–59. http://dx.doi.org/10.35940/ijitee.b8009.129219.
Full textReddy, K. Nagi, Neha Hasan, Bashar Abdullah, Mohd Mustaqeem, and Tabassum Ara. "intelligent robust malware detection by implementing deep learning." International journal of health sciences, June 27, 2022, 2835–43. http://dx.doi.org/10.53730/ijhs.v6ns6.9818.
Full text"A New Hybrid Strategy for Malware Detection Classification with Multiple Feature Selection Methods and Ensemble Learning Methods." International Journal of Engineering and Advanced Technology 9, no. 2 (December 30, 2019): 4013–18. http://dx.doi.org/10.35940/ijeat.b4666.129219.
Full textCeldrán, Alberto Huertas, Pedro Miguel Sánchez Sánchez, Miguel Azorín Castillo, Gérôme Bovet, Gregorio Martínez Pérez, and Burkhard Stiller. "Intelligent and behavioral-based detection of malware in IoT spectrum sensors." International Journal of Information Security, July 29, 2022. http://dx.doi.org/10.1007/s10207-022-00602-w.
Full text"Machine Learning and Data Mining Methods for Cyber Security: A Survey." Mesopotamian Journal of Cyber Security, November 25, 2022, 47–56. http://dx.doi.org/10.58496/mjcs/2022/006.
Full textNirmala, Baby, Raed Abueid, and Munef Abdullah Ahmed. "Big Data Distributed Support Vector Machine." Mesopotamian Journal of Big Data, February 22, 2022, 12–22. http://dx.doi.org/10.58496/mjbd/2022/002.
Full textPark, Sunoo, Michael Specter, Neha Narula, and Ronald L. Rivest. "Going from bad to worse: from Internet voting to blockchain voting." Journal of Cybersecurity 7, no. 1 (January 1, 2021). http://dx.doi.org/10.1093/cybsec/tyaa025.
Full text