Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review on malware analysis for iot and android system
CS Yadav, S Gupta - SN Computer Science, 2022 - Springer
Today all humankind is willing to avail more facilities and hopes everything should be
available with a click of the button. In order to offer different services, the developers have …
available with a click of the button. In order to offer different services, the developers have …
Similarity hash based scoring of portable executable files for efficient malware detection in IoT
The current rise in malicious attacks shows that existing security systems are bypassed by
malicious files. Similarity hashing has been adopted for sample triaging in malware analysis …
malicious files. Similarity hashing has been adopted for sample triaging in malware analysis …
Android ransomware analysis using convolutional neural network and fuzzy hashing features
H Rodriguez-Bazan, G Sidorov… - IEEE …, 2023 - ieeexplore.ieee.org
Most of the time, cybercriminals look for new ways to bypass security controls by improving
their attacks. In the 1980s, attackers developed malware to kidnap user data by requesting …
their attacks. In the 1980s, attackers developed malware to kidnap user data by requesting …
[HTML][HTML] A procedure for tracing chain of custody in digital image forensics: A paradigm based on grey hash and blockchain
Digital evidence is critical in cybercrime investigations because it is used to connect
individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily …
individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily …
Nation-state threat actor attribution using fuzzy hashing
M Kida, O Olukoya - IEEE Access, 2022 - ieeexplore.ieee.org
Recent years have seen a rise in state-sponsored malware. Advanced Persistent Threat
groups (APTs) have been waging a covert war with little repercussions due to the …
groups (APTs) have been waging a covert war with little repercussions due to the …
[HTML][HTML] A temporal analysis and evaluation of fuzzy hashing algorithms for Android malware analysis
M Fleming, O Olukoya - Forensic Science International: Digital Investigation, 2024 - Elsevier
Fuzzy hashing has been utilised in digital forensics and malware analysis for malware
detection, malware variant classification, file clustering, document similarity detection …
detection, malware variant classification, file clustering, document similarity detection …
[HTML][HTML] Android malware classification based on fuzzy hashing visualization
H Rodriguez-Bazan, G Sidorov… - Machine Learning and …, 2023 - mdpi.com
The proliferation of Android-based devices has brought about an unprecedented surge in
mobile application usage, making the Android ecosystem a prime target for cybercriminals …
mobile application usage, making the Android ecosystem a prime target for cybercriminals …
Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios
An everyday growing number of malware variants target end-users and organizations. To
reduce the amount of individual malware handling, security analysts apply techniques for …
reduce the amount of individual malware handling, security analysts apply techniques for …
Imaging and evaluating the memory access for malware
Malware analysis is a forensic process. After infection and the damage represented itself
with the full scale, then the analysis of the attack, the structure of the executable and the aim …
with the full scale, then the analysis of the attack, the structure of the executable and the aim …
Improving uncertainty in chain of custody for image forensics investigation applications
Cybercrime investigations rely heavily on digital evidence to establish links between
suspects and the criminal conduct they are allegedly involved in. As a result, digital …
suspects and the criminal conduct they are allegedly involved in. As a result, digital …