Journal articles on the topic 'Identify malware'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Identify malware.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Suryati, One Tika, and Avon Budiono. "Impact Analysis of Malware Based on Call Network API With Heuristic Detection Method." International Journal of Advances in Data and Information Systems 1, no. 1 (April 1, 2020): 1–8. http://dx.doi.org/10.25008/ijadis.v1i1.176.
Full textYuswanto, Andrie, and Budi Wibowo. "A SYSTEMATIC REVIEW METHOD FOR SECURITY ANALYSIS OF INTERNET OF THINGS ON HONEYPOT DETECTION." TEKNOKOM 4, no. 1 (May 24, 2021): 16–20. http://dx.doi.org/10.31943/teknokom.v4i1.54.
Full textBai, Jinrong, Qibin Shi, and Shiguang Mu. "A Malware and Variant Detection Method Using Function Call Graph Isomorphism." Security and Communication Networks 2019 (September 22, 2019): 1–12. http://dx.doi.org/10.1155/2019/1043794.
Full textBai, Jin Rong, Shi Guang Mu, and Guo Zhong Zou. "The Application of Machine Learning to Study Malware Evolution." Applied Mechanics and Materials 530-531 (February 2014): 875–78. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.875.
Full textEt. al., Balal Sohail. "Macro Based Malware Detection System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 5776–87. http://dx.doi.org/10.17762/turcomat.v12i3.2254.
Full textSusanto, Susanto, M. Agus Syamsul Arifin, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trend malware source of IoT network." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 450. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp450-459.
Full textMuhtadi, Adib Fakhri, and Ahmad Almaarif. "Analysis of Malware Impact on Network Traffic using Behavior-based Detection Technique." International Journal of Advances in Data and Information Systems 1, no. 1 (April 1, 2020): 17–25. http://dx.doi.org/10.25008/ijadis.v1i1.14.
Full textMuhtadi, Adib Fakhri, and Ahmad Almaarif. "Analysis of Malware Impact on Network Traffic using Behavior-based Detection Technique." International Journal of Advances in Data and Information Systems 1, no. 1 (March 9, 2020): 17–25. http://dx.doi.org/10.25008/ijadis.v1i1.8.
Full textMartín, Ignacio, José Alberto Hernández, Alfonso Muñoz, and Antonio Guzmán. "Android Malware Characterization Using Metadata and Machine Learning Techniques." Security and Communication Networks 2018 (July 8, 2018): 1–11. http://dx.doi.org/10.1155/2018/5749481.
Full textKalash, Mahmoud, Mrigank Rochan, Noman Mohammed, Neil Bruce, Yang Wang, and Farkhund Iqbal. "A Deep Learning Framework for Malware Classification." International Journal of Digital Crime and Forensics 12, no. 1 (January 2020): 90–108. http://dx.doi.org/10.4018/ijdcf.2020010105.
Full textHama Saeed, Mariwan Ahmed. "Malware in Computer Systems: Problems and Solutions." IJID (International Journal on Informatics for Development) 9, no. 1 (April 19, 2020): 1. http://dx.doi.org/10.14421/ijid.2020.09101.
Full textChristiana, Abikoye Oluwakemi, Benjamin Aruwa Gyunka, and Akande Noah. "Android Malware Detection through Machine Learning Techniques: A Review." International Journal of Online and Biomedical Engineering (iJOE) 16, no. 02 (February 12, 2020): 14. http://dx.doi.org/10.3991/ijoe.v16i02.11549.
Full textRinaldi, Aditia. "Implementasi Fuzzy Hashing untuk Signature Malware." Jurnal ULTIMA Computing 6, no. 1 (June 1, 2014): 33–38. http://dx.doi.org/10.31937/sk.v6i1.293.
Full textAlswaina, Fahad, and Khaled Elleithy. "Android Malware Family Classification and Analysis: Current Status and Future Directions." Electronics 9, no. 6 (June 5, 2020): 942. http://dx.doi.org/10.3390/electronics9060942.
Full textSuryati, One Tika, and Avon Budiono. "Impact Analysis of Malware Based on Call Network API With Heuristic Detection Method." International Journal of Advances in Data and Information Systems 1, no. 1 (March 10, 2020): 8. http://dx.doi.org/10.25008/ijadis.v1i1.2.
Full textSingh, Jaiteg, Deepak Thakur, Farman Ali, Tanya Gera, and Kyung Sup Kwak. "Deep Feature Extraction and Classification of Android Malware Images." Sensors 20, no. 24 (December 8, 2020): 7013. http://dx.doi.org/10.3390/s20247013.
Full textVassallo, Evan W., and Kevin Manaugh. "Spatially Clustered Autonomous Vehicle Malware: Producing New Urban Geographies of Inequity." Transportation Research Record: Journal of the Transportation Research Board 2672, no. 1 (August 23, 2018): 66–75. http://dx.doi.org/10.1177/0361198118794057.
Full textBai, Jinrong, Junfeng Wang, and Guozhong Zou. "A Malware Detection Scheme Based on Mining Format Information." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/260905.
Full textT, Sai Tejeshwar Reddy. "An Enhanced Novel GA-based Malware Detection in End Systems Using Structured and Unstructured Data by Comparing Support Vector Machine and Neural Network." Revista Gestão Inovação e Tecnologias 11, no. 2 (June 5, 2021): 1514–25. http://dx.doi.org/10.47059/revistageintec.v11i2.1777.
Full textGarg, Gourav, Ashutosh Sharma*, and Anshul Arora. "SFDroid: Android Malware Detection using Ranked Static Features." International Journal of Recent Technology and Engineering 10, no. 1 (May 30, 2021): 142–52. http://dx.doi.org/10.35940/ijrte.a5804.0510121.
Full textNarayanan, Ajit, Yi Chen, Shaoning Pang, and Ban Tao. "The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures." Scientific World Journal 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/671096.
Full textBai, Jin Rong, Zhen Zhou An, Guo Zhong Zou, and Shi Guang Mu. "A Dynamic Malware Detection Approach by Mining the Frequency of API Calls." Applied Mechanics and Materials 519-520 (February 2014): 309–12. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.309.
Full textWang, Huanran, Hui He, and Weizhe Zhang. "Demadroid: Object Reference Graph-Based Malware Detection in Android." Security and Communication Networks 2018 (May 31, 2018): 1–16. http://dx.doi.org/10.1155/2018/7064131.
Full textBiałczak, Piotr, and Wojciech Mazurczyk. "Hfinger: Malware HTTP Request Fingerprinting." Entropy 23, no. 5 (April 23, 2021): 507. http://dx.doi.org/10.3390/e23050507.
Full textLiang, Guanghui, Jianmin Pang, Zheng Shan, Runqing Yang, and Yihang Chen. "Automatic Benchmark Generation Framework for Malware Detection." Security and Communication Networks 2018 (September 6, 2018): 1–8. http://dx.doi.org/10.1155/2018/4947695.
Full textKumar, Rajesh, Xiaosong Zhang, Riaz Khan, and Abubakar Sharif. "Research on Data Mining of Permission-Induced Risk for Android IoT Devices." Applied Sciences 9, no. 2 (January 14, 2019): 277. http://dx.doi.org/10.3390/app9020277.
Full textVenkatraman, Sitalakshmi, and Mamoun Alazab. "Use of Data Visualisation for Zero-Day Malware Detection." Security and Communication Networks 2018 (December 2, 2018): 1–13. http://dx.doi.org/10.1155/2018/1728303.
Full textDu, Bo, Haiyan Wang, and Maoxing Liu. "An information diffusion model in social networks with carrier compartment and delay." Nonlinear Analysis: Modelling and Control 23, no. 4 (August 10, 2018): 568–82. http://dx.doi.org/10.15388/na.2018.4.7.
Full textChen, Hongyi, Jinshu Su, Linbo Qiao, and Qin Xin. "Malware Collusion Attack against SVM: Issues and Countermeasures." Applied Sciences 8, no. 10 (September 21, 2018): 1718. http://dx.doi.org/10.3390/app8101718.
Full textHwang, Chanwoong, Junho Hwang, Jin Kwak, and Taejin Lee. "Platform-Independent Malware Analysis Applicable to Windows and Linux Environments." Electronics 9, no. 5 (May 12, 2020): 793. http://dx.doi.org/10.3390/electronics9050793.
Full textZou, Deqing, Yueming Wu, Siru Yang, Anki Chauhan, Wei Yang, Jiangying Zhong, Shihan Dou, and Hai Jin. "IntDroid." ACM Transactions on Software Engineering and Methodology 30, no. 3 (May 2021): 1–32. http://dx.doi.org/10.1145/3442588.
Full textSharma, Kavita, and B. B. Gupta. "Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches." International Journal of E-Services and Mobile Applications 11, no. 2 (April 2019): 1–21. http://dx.doi.org/10.4018/ijesma.2019040101.
Full textAli, Muhammad, Stavros Shiaeles, Gueltoum Bendiab, and Bogdan Ghita. "MALGRA: Machine Learning and N-Gram Malware Feature Extraction and Detection System." Electronics 9, no. 11 (October 26, 2020): 1777. http://dx.doi.org/10.3390/electronics9111777.
Full textAlwaghid, Alhanoof, and Nurul Sarkar. "Exploring Malware Behavior of Webpages Using Machine Learning Technique: An Empirical Study." Electronics 9, no. 6 (June 23, 2020): 1033. http://dx.doi.org/10.3390/electronics9061033.
Full textCeron, João, Klaus Steding-Jessen, Cristine Hoepers, Lisandro Granville, and Cíntia Margi. "Improving IoT Botnet Investigation Using an Adaptive Network Layer." Sensors 19, no. 3 (February 11, 2019): 727. http://dx.doi.org/10.3390/s19030727.
Full textSapalo Sicato, Jose Costa, Pradip Kumar Sharma, Vincenzo Loia, and Jong Hyuk Park. "VPNFilter Malware Analysis on Cyber Threat in Smart Home Network." Applied Sciences 9, no. 13 (July 9, 2019): 2763. http://dx.doi.org/10.3390/app9132763.
Full textHwang, Seonbin, Hogyeong Kim, Junho Hwang, and Taejin Lee. "A Study on Two-dimensional Array-based Technology to Identify Obfuscatied Malware." Journal of KIISE 45, no. 8 (August 31, 2018): 769–77. http://dx.doi.org/10.5626/jok.2018.45.8.769.
Full textChoi, Sunoh, Jangseong Bae, Changki Lee, Youngsoo Kim, and Jonghyun Kim. "Attention-Based Automated Feature Extraction for Malware Analysis." Sensors 20, no. 10 (May 20, 2020): 2893. http://dx.doi.org/10.3390/s20102893.
Full textImamgayazova, D. I. "LEXICAL AND DERIVATIONAL MEANINGS OF “MALWARE” FRAME IN RUSSIAN AND ENGISH-LANGUAGE MEDIA TEXTS." Review of Omsk State Pedagogical University. Humanitarian research, no. 31 (2021): 101–6. http://dx.doi.org/10.36809/2309-9380-2021-31-101-106.
Full textLi, Shudong, Qianqing Zhang, Xiaobo Wu, Weihong Han, and Zhihong Tian. "Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques." Security and Communication Networks 2021 (September 6, 2021): 1–12. http://dx.doi.org/10.1155/2021/9396141.
Full textVafaei-Zadeh, Ali, Ramayah Thurasamy, and Haniruzila Hanifah. "Modeling anti-malware use intention of university students in a developing country using the theory of planned behavior." Kybernetes 48, no. 8 (September 2, 2019): 1565–85. http://dx.doi.org/10.1108/k-05-2018-0226.
Full textAshik, Mathew, A. Jyothish, S. Anandaram, P. Vinod, Francesco Mercaldo, Fabio Martinelli, and Antonella Santone. "Detection of Malicious Software by Analyzing Distinct Artifacts Using Machine Learning and Deep Learning Algorithms." Electronics 10, no. 14 (July 15, 2021): 1694. http://dx.doi.org/10.3390/electronics10141694.
Full textThanh Vu, Simon Nam, Mads Stege, Peter Issam El-Habr, Jesper Bang, and Nicola Dragoni. "A Survey on Botnets: Incentives, Evolution, Detection and Current Trends." Future Internet 13, no. 8 (July 31, 2021): 198. http://dx.doi.org/10.3390/fi13080198.
Full textAlazab, Moutaz. "Automated Malware Detection in Mobile App Stores Based on Robust Feature Generation." Electronics 9, no. 3 (March 5, 2020): 435. http://dx.doi.org/10.3390/electronics9030435.
Full textSenanayake, Janaka, Harsha Kalutarage, and Mhd Omar Al-Kadri. "Android Mobile Malware Detection Using Machine Learning: A Systematic Review." Electronics 10, no. 13 (July 5, 2021): 1606. http://dx.doi.org/10.3390/electronics10131606.
Full textBiałczak, Piotr, and Wojciech Mazurczyk. "Characterizing Anomalies in Malware-Generated HTTP Traffic." Security and Communication Networks 2020 (September 1, 2020): 1–26. http://dx.doi.org/10.1155/2020/8848863.
Full textCara, Fabrizio, Michele Scalas, Giorgio Giacinto, and Davide Maiorca. "On the Feasibility of Adversarial Sample Creation Using the Android System API." Information 11, no. 9 (September 10, 2020): 433. http://dx.doi.org/10.3390/info11090433.
Full textChoi, Mi-Jung, Jiwon Bang, Jongwook Kim, Hajin Kim, and Yang-Sae Moon. "All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis." Security and Communication Networks 2019 (October 13, 2019): 1–16. http://dx.doi.org/10.1155/2019/5278137.
Full textLiu, Lin, Wang Ren, Feng Xie, Shengwei Yi, Junkai Yi, and Peng Jia. "Learning-Based Detection for Malicious Android Application Using Code Vectorization." Security and Communication Networks 2021 (August 19, 2021): 1–11. http://dx.doi.org/10.1155/2021/9964224.
Full textLiu, Bo, Jinfu Chen, Songling Qin, Zufa Zhang, Yisong Liu, Lingling Zhao, and Jingyi Chen. "An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic." Security and Communication Networks 2021 (April 29, 2021): 1–14. http://dx.doi.org/10.1155/2021/5518909.
Full text