[PDF][PDF] A study on malware and malware detection techniques
R Tahir - International Journal of Education and Management …, 2018 - mecs-press.org
The impact of malicious software are getting worse day by day. Malicious software or
malwares are programs that are created to harm, interrupt or damage computers, networks …
malwares are programs that are created to harm, interrupt or damage computers, networks …
A systematic literature review and quality analysis of Javascript malware detection
Context: JavaScript (JS) is an often-used programming language by millions of web pages
and is also affected by thousands of malicious attacks. Objective: In this investigation, we …
and is also affected by thousands of malicious attacks. Objective: In this investigation, we …
[PDF][PDF] Malware and malware detection techniques: A survey
J Landage, MP Wankhade - International Journal of Engineering …, 2013 - academia.edu
Now a day's malicious program is a serious threat. It is developed to damage the computer
system and some of them are spread over the connected system in the network or internet …
system and some of them are spread over the connected system in the network or internet …
[PDF][PDF] A review of malware detection based on pattern matching technique
MK Sahu, M Ahirwar, A Hemlata - Int. J. of Computer Science and …, 2014 - Citeseer
Malware detection developer faced a problem for a generation of new signature of malware
code. A very famous and recognized technique is pattern based malware code detection …
code. A very famous and recognized technique is pattern based malware code detection …
Survey of mobile malware analysis, detection techniques and tool
The rapid increase in the use of smartphones, has contributed to the increase in mobile
attackers. In most situations deceitful applications are infected with malicious contents to …
attackers. In most situations deceitful applications are infected with malicious contents to …
[PDF][PDF] Revealing the criterion on botnet detection technique
Botnet have already made a big impact that need much attention as one of the most
emergent threats to the Internet security. More worst when the peer-to-peer (P2P) botnets …
emergent threats to the Internet security. More worst when the peer-to-peer (P2P) botnets …
Trust-based voting method for efficient malware detection
SS More, PP Gaikwad - Procedia Computer Science, 2016 - Elsevier
The internet plays an important role in all areas of society from the economy to the
government. Security means permitting things you do want, while preventing things you …
government. Security means permitting things you do want, while preventing things you …
Security in iot-based smart homes: A taxonomy study of detection methods of mirai malware and countermeasures
During recent years, there has been widespread adoption of the Internet and swift
digitization within various sectors, including smart homes. These also led to the rapid growth …
digitization within various sectors, including smart homes. These also led to the rapid growth …
A syntactic approach for detecting viral polymorphic malware variants
V Naidu, A Narayanan - Intelligence and Security Informatics: 11th Pacific …, 2016 - Springer
Polymorphic malware is currently difficult to identify. Such malware is able to mutate into
functionally equivalent variants of themselves. Modern detection techniques are not …
functionally equivalent variants of themselves. Modern detection techniques are not …
Using different substitution matrices in a string-matching technique for identifying viral polymorphic malware variants
V Naidu, A Narayanan - 2016 IEEE congress on evolutionary …, 2016 - ieeexplore.ieee.org
Antivirus systems have difficulty in detecting polymorphic variants of known viruses without
explicit signatures for such variants. Initial work on investigating efficient and effective string …
explicit signatures for such variants. Initial work on investigating efficient and effective string …