A comprehensive survey on deep learning based malware detection techniques
M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …
harmful threats to the digital world. Malware mitigation techniques have evolved over the …
Self-supervised vision transformers for malware detection
Malware detection plays a crucial role in cyber-security with the increase in malware growth
and advancements in cyber-attacks. Previously unseen malware which is not determined by …
and advancements in cyber-attacks. Previously unseen malware which is not determined by …
Cyber fraud economics, scam types, and potential measures to protect US seniors: A short review
Cyber fraud has become increasingly common as it can be easily carried out with relative
ease through multiple mediums. Particularly, the elderly population aged 60 and above …
ease through multiple mediums. Particularly, the elderly population aged 60 and above …
An android malware detection and classification approach based on contrastive lerning
S Yang, Y Wang, H Xu, F Xu, M Chen - Computers & Security, 2022 - Elsevier
Android malware detection is a serious issue for mobile security. Recent machine learning-
based research could achieve high accuracy. However, there are far more unlabeled …
based research could achieve high accuracy. However, there are far more unlabeled …
Antiviruses under the microscope: A hands-on perspective
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …
research has been done about them, especially proposing new detection procedures that …
An approach to detecting cyber attacks against smart power grids based on the analysis of network traffic self-similarity
I Kotenko, I Saenko, O Lauta, A Kribel - Energies, 2020 - mdpi.com
The paper discusses an approach for detecting cyber attacks against smart power supply
networks, based on identifying anomalies in network traffic by assessing its self-similarity …
networks, based on identifying anomalies in network traffic by assessing its self-similarity …
An efficient hybrid webshell detection method for webserver of marine transportation systems
HV Le, TN Nguyen, HN Nguyen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
An increase in the number of Maritime Intelligent Transport Systems (MITSs) also means an
increase in the number of information security risks. Usually, the administration and …
increase in the number of information security risks. Usually, the administration and …
E2E-RDS: Efficient End-to-End ransomware detection system based on Static-Based ML and Vision-Based DL approaches
Nowadays, ransomware is considered one of the most critical cyber-malware categories. In
recent years various malware detection and classification approaches have been proposed …
recent years various malware detection and classification approaches have been proposed …
Evaluation of local security event management system vs. standard antivirus software
A Pérez-Sánchez, R Palacios - Applied Sciences, 2022 - mdpi.com
Featured Application This work can be applied to develop new anti-malware strategies
based on event analysis. Abstract The detection and classification of threats in computer …
based on event analysis. Abstract The detection and classification of threats in computer …
Performance monitoring counter based intelligent malware detection and design alternatives
Hardware solutions for malware detection are becoming increasingly important as software-
based solutions can be easily compromised by intelligent malware. However, the cost of …
based solutions can be easily compromised by intelligent malware. However, the cost of …