[PDF][PDF] A study on malware and malware detection techniques

R Tahir - International Journal of Education and Management …, 2018 - mecs-press.org
The impact of malicious software are getting worse day by day. Malicious software or
malwares are programs that are created to harm, interrupt or damage computers, networks …

A systematic literature review and quality analysis of Javascript malware detection

MF Sohan, A Basalamah - IEEE Access, 2020 - ieeexplore.ieee.org
Context: JavaScript (JS) is an often-used programming language by millions of web pages
and is also affected by thousands of malicious attacks. Objective: In this investigation, we …

[PDF][PDF] Malware and malware detection techniques: A survey

J Landage, MP Wankhade - International Journal of Engineering …, 2013 - academia.edu
Now a day's malicious program is a serious threat. It is developed to damage the computer
system and some of them are spread over the connected system in the network or internet …

[PDF][PDF] A review of malware detection based on pattern matching technique

MK Sahu, M Ahirwar, A Hemlata - Int. J. of Computer Science and …, 2014 - Citeseer
Malware detection developer faced a problem for a generation of new signature of malware
code. A very famous and recognized technique is pattern based malware code detection …

Survey of mobile malware analysis, detection techniques and tool

NK Gyamfi, E Owusu - 2018 IEEE 9th Annual Information …, 2018 - ieeexplore.ieee.org
The rapid increase in the use of smartphones, has contributed to the increase in mobile
attackers. In most situations deceitful applications are infected with malicious contents to …

[PDF][PDF] Revealing the criterion on botnet detection technique

RS Abdullah, MF Abdollah, ZAM Noh… - International Journal of …, 2013 - academia.edu
Botnet have already made a big impact that need much attention as one of the most
emergent threats to the Internet security. More worst when the peer-to-peer (P2P) botnets …

Trust-based voting method for efficient malware detection

SS More, PP Gaikwad - Procedia Computer Science, 2016 - Elsevier
The internet plays an important role in all areas of society from the economy to the
government. Security means permitting things you do want, while preventing things you …

Security in iot-based smart homes: A taxonomy study of detection methods of mirai malware and countermeasures

RB Auliar, G Bekaroo - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
During recent years, there has been widespread adoption of the Internet and swift
digitization within various sectors, including smart homes. These also led to the rapid growth …

A syntactic approach for detecting viral polymorphic malware variants

V Naidu, A Narayanan - Intelligence and Security Informatics: 11th Pacific …, 2016 - Springer
Polymorphic malware is currently difficult to identify. Such malware is able to mutate into
functionally equivalent variants of themselves. Modern detection techniques are not …

Using different substitution matrices in a string-matching technique for identifying viral polymorphic malware variants

V Naidu, A Narayanan - 2016 IEEE congress on evolutionary …, 2016 - ieeexplore.ieee.org
Antivirus systems have difficulty in detecting polymorphic variants of known viruses without
explicit signatures for such variants. Initial work on investigating efficient and effective string …