Articles with "malware analysis" as a keyword



Photo by hajjidirir from unsplash

IoT Malware Analysis Using Federated Learning: A Comprehensive Survey

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3235389

Abstract: The Internet of Things (IoT) has paved the way to a highly connected society where all things are interconnected and exchanging information has become more accessible through the internet. With the use of IoT devices,… read more here.

Keywords: malware analysis; federated learning; malware; user data ... See more keywords
Photo by dawson2406 from unsplash

Malware Analysis by Combining Multiple Detectors and Observation Windows

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2021.3082002

Abstract: Malware developers continually attempt to modify the execution pattern of malicious code hiding it inside apparent normal applications, which makes its detection and classification challenging. This article proposes an ensemble detector, which exploits the capabilities… read more here.

Keywords: malware analysis; detection; analysis; analysis combining ... See more keywords
Photo by jontyson from unsplash

Real Time Working of Keylogger Malware Analysis

Sign Up to like & get
recommendations!
Published in 2020 at "International journal of engineering research and technology"

DOI: 10.17577/ijertv9is100265

Abstract: In the world with increasing technology the safety should also increase. The effect of malware is getting worse, studies say. There are two kinds of malware analysis listed here. Static Malware Analysis is one, and… read more here.

Keywords: working keylogger; time working; real time; malware analysis ... See more keywords
Photo from wikipedia

Evaluating the Impact of Malware Analysis Techniques for Securing Web Applications through a Decision-Making Framework under Fuzzy Environment

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Intelligent Engineering and Systems"

DOI: 10.22266/ijies2020.1231.09

Abstract: Nowadays, most of the cyber-attacks are initiated by extremely malicious programs known as Malware. Malwares are very vigorous and can penetrate the security of information and communication systems. While there are different techniques available for… read more here.

Keywords: analysis techniques; malware analysis; analysis; decision making ... See more keywords
Photo by dawson2406 from unsplash

Sisyfos: A Modular and Extendable Open Malware Analysis Platform

Sign Up to like & get
recommendations!
Published in 2021 at "Applied Sciences"

DOI: 10.3390/app11072980

Abstract: Sisyfos is a modular and extensible platform for malware analysis; it addresses multiple operating systems, including critical infrastructure ones. Its purpose is to enable the development and evaluation of new tools as well as the… read more here.

Keywords: sisyfos modular; platform; malware analysis; analysis ... See more keywords
Photo by markusspiske from unsplash

Malware Analysis and Detection Using Machine Learning Algorithms

Sign Up to like & get
recommendations!
Published in 2022 at "Symmetry"

DOI: 10.3390/sym14112304

Abstract: One of the most significant issues facing internet users nowadays is malware. Polymorphic malware is a new type of malicious software that is more adaptable than previous generations of viruses. Polymorphic malware constantly modifies its… read more here.

Keywords: malware analysis; machine learning; malware; detection ... See more keywords