[HTML][HTML] A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges

T Sasi, AH Lashkari, R Lu, P ** with malware is getting more and more challenging, given their relentless growth in
complexity and volume. One of the most common approaches in literature is using machine …

Lightweight classification of IoT malware based on image recognition

J Su, DV Vasconcellos, S Prasad… - 2018 IEEE 42Nd …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is an extension of the traditional Internet, which allows a very
large number of smart devices, such as home appliances, network cameras, sensors and …

A comparison of static, dynamic, and hybrid analysis for malware detection

A Damodaran, FD Troia, CA Visaggio… - Journal of Computer …, 2017 - Springer
In this research, we compare malware detection techniques based on static, dynamic, and
hybrid analysis. Specifically, we train Hidden Markov Models (HMMs) on both static and …

[HTML][HTML] Early-stage malware prediction using recurrent neural networks

M Rhode, P Burnap, K Jones - computers & security, 2018 - Elsevier
Static malware analysis is well-suited to endpoint anti-virus systems as it can be conducted
quickly by examining the features of an executable piece of code and matching it to …

Malware detection with deep neural network using process behavior

S Tobiyama, Y Yamaguchi, H Shimada… - 2016 IEEE 40th …, 2016 - ieeexplore.ieee.org
Increase of malware and advanced cyber-attacks are now becoming a serious problem.
Unknown malware which has not determined by security vendors is often used in these …

A survey of the applications of text mining in financial domain

BS Kumar, V Ravi - Knowledge-Based Systems, 2016 - Elsevier
Text mining has found a variety of applications in diverse domains. Of late, prolific work is
reported in using text mining techniques to solve problems in financial domain. The …

Intelligent vision-based malware detection and classification using deep random forest paradigm

SA Roseline, S Geetha, S Kadry, Y Nam - IEEE Access, 2020 - ieeexplore.ieee.org
Malware is a rapidly increasing menace to modern computing. Malware authors continually
incorporate various sophisticated features like code obfuscations to create malware variants …

Cross-architecture bug search in binary executables

J Pewny, B Garmany, R Gawlik… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
With the general availability of closed-source software for various CPU architectures, there is
a need to identify security-critical vulnerabilities at the binary level to perform a vulnerability …

A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence

E Amer, I Zelinka - Computers & Security, 2020 - Elsevier
Malware API call graph derived from API call sequences is considered as a representative
technique to understand the malware behavioral characteristics. However, it is troublesome …