Data mining methods for detection of new malicious executables
A serious security threat today is malicious executables, especially new, unseen malicious
executables often arriving as email attachments. These new malicious executables are …
executables often arriving as email attachments. These new malicious executables are …
[PDF][PDF] Automated Worm Fingerprinting.
Network worms are a clear and growing threat to the security of today's Internet-connected
hosts and networks. The combination of the Internet's unrestricted connectivity and …
hosts and networks. The combination of the Internet's unrestricted connectivity and …
Machine learning for android malware detection using permission and api calls
The Google Android mobile phone platform is one of the most anticipated smartphone
operating systems on the market. The open source Android platform allows developers to …
operating systems on the market. The open source Android platform allows developers to …
A novel approach to detect malware based on API call sequence analysis
Y Ki, E Kim, HK Kim - International Journal of Distributed …, 2015 - journals.sagepub.com
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an
endless battle between ever-evolving malware and antivirus programs that need to process …
endless battle between ever-evolving malware and antivirus programs that need to process …
[PDF][PDF] DL4MD: A deep learning framework for intelligent malware detection
In the Internet-age, malware poses a serious and evolving threat to security, making the
detection of malware of utmost concern. Many research efforts have been conducted on …
detection of malware of utmost concern. Many research efforts have been conducted on …
An improved two-hidden-layer extreme learning machine for malware hunting
Detecting unknown malware and their variants remains both an operational challenge and a
research challenge. In recent years, there have been attempts to design machine learning …
research challenge. In recent years, there have been attempts to design machine learning …
Malicious sequential pattern mining for automatic malware detection
Due to its damage to Internet security, malware (eg, virus, worm, trojan) and its detection has
caught the attention of both anti-malware industry and researchers for decades. To protect …
caught the attention of both anti-malware industry and researchers for decades. To protect …
An artificial immune system architecture for computer security applications
PK Harmer, PD Williams, GH Gunsch… - IEEE transactions on …, 2002 - ieeexplore.ieee.org
With increased global interconnectivity and reliance on e-commerce, network services and
Internet communication, computer security has become a necessity. Organizations must …
Internet communication, computer security has become a necessity. Organizations must …
N-gram-based detection of new malicious code
T Abou-Assaleh, N Cercone, V Keselj… - Proceedings of the …, 2004 - ieeexplore.ieee.org
The current commercial anti-virus software detects a virus only after the virus has appeared
and caused damage. Motivated by the standard signature-based technique for detecting …
and caused damage. Motivated by the standard signature-based technique for detecting …
Methods, media, and systems for detecting attack on a digital processing device
Methods, media, and systems for detecting attack are pro vided. In some embodiments, the
methods include: compar ing at least part of a document to a static detection model; …
methods include: compar ing at least part of a document to a static detection model; …