Data mining methods for detection of new malicious executables

MG Schultz, E Eskin, F Zadok… - Proceedings 2001 IEEE …, 2000 - ieeexplore.ieee.org
A serious security threat today is malicious executables, especially new, unseen malicious
executables often arriving as email attachments. These new malicious executables are …

[PDF][PDF] Automated Worm Fingerprinting.

S Singh, C Estan, G Varghese, S Savage - OSDI, 2004 - usenix.org
Network worms are a clear and growing threat to the security of today's Internet-connected
hosts and networks. The combination of the Internet's unrestricted connectivity and …

Machine learning for android malware detection using permission and api calls

N Peiravian, X Zhu - … 25th international conference on tools with …, 2013 - ieeexplore.ieee.org
The Google Android mobile phone platform is one of the most anticipated smartphone
operating systems on the market. The open source Android platform allows developers to …

A novel approach to detect malware based on API call sequence analysis

Y Ki, E Kim, HK Kim - International Journal of Distributed …, 2015 - journals.sagepub.com
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an
endless battle between ever-evolving malware and antivirus programs that need to process …

[PDF][PDF] DL4MD: A deep learning framework for intelligent malware detection

W Hardy, L Chen, S Hou, Y Ye, X Li - Proceedings of the International …, 2016 - covert.io
In the Internet-age, malware poses a serious and evolving threat to security, making the
detection of malware of utmost concern. Many research efforts have been conducted on …

An improved two-hidden-layer extreme learning machine for malware hunting

AN Jahromi, S Hashemi, A Dehghantanha… - Computers & …, 2020 - Elsevier
Detecting unknown malware and their variants remains both an operational challenge and a
research challenge. In recent years, there have been attempts to design machine learning …

Malicious sequential pattern mining for automatic malware detection

Y Fan, Y Ye, L Chen - Expert Systems with Applications, 2016 - Elsevier
Due to its damage to Internet security, malware (eg, virus, worm, trojan) and its detection has
caught the attention of both anti-malware industry and researchers for decades. To protect …

An artificial immune system architecture for computer security applications

PK Harmer, PD Williams, GH Gunsch… - IEEE transactions on …, 2002 - ieeexplore.ieee.org
With increased global interconnectivity and reliance on e-commerce, network services and
Internet communication, computer security has become a necessity. Organizations must …

N-gram-based detection of new malicious code

T Abou-Assaleh, N Cercone, V Keselj… - Proceedings of the …, 2004 - ieeexplore.ieee.org
The current commercial anti-virus software detects a virus only after the virus has appeared
and caused damage. Motivated by the standard signature-based technique for detecting …

Methods, media, and systems for detecting attack on a digital processing device

SJ Stolfo, WJ Li, AD Keromylis, E Androulaki - US Patent 8,789,172, 2014 - Google Patents
Methods, media, and systems for detecting attack are pro vided. In some embodiments, the
methods include: compar ing at least part of a document to a static detection model; …