[HTML][HTML] A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
T Sasi, AH Lashkari, R Lu, P ** with malware is getting more and more challenging, given their relentless growth in
complexity and volume. One of the most common approaches in literature is using machine …
complexity and volume. One of the most common approaches in literature is using machine …
Lightweight classification of IoT malware based on image recognition
J Su, DV Vasconcellos, S Prasad… - 2018 IEEE 42Nd …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is an extension of the traditional Internet, which allows a very
large number of smart devices, such as home appliances, network cameras, sensors and …
large number of smart devices, such as home appliances, network cameras, sensors and …
A comparison of static, dynamic, and hybrid analysis for malware detection
In this research, we compare malware detection techniques based on static, dynamic, and
hybrid analysis. Specifically, we train Hidden Markov Models (HMMs) on both static and …
hybrid analysis. Specifically, we train Hidden Markov Models (HMMs) on both static and …
[HTML][HTML] Early-stage malware prediction using recurrent neural networks
Static malware analysis is well-suited to endpoint anti-virus systems as it can be conducted
quickly by examining the features of an executable piece of code and matching it to …
quickly by examining the features of an executable piece of code and matching it to …
Malware detection with deep neural network using process behavior
S Tobiyama, Y Yamaguchi, H Shimada… - 2016 IEEE 40th …, 2016 - ieeexplore.ieee.org
Increase of malware and advanced cyber-attacks are now becoming a serious problem.
Unknown malware which has not determined by security vendors is often used in these …
Unknown malware which has not determined by security vendors is often used in these …
A survey of the applications of text mining in financial domain
Text mining has found a variety of applications in diverse domains. Of late, prolific work is
reported in using text mining techniques to solve problems in financial domain. The …
reported in using text mining techniques to solve problems in financial domain. The …
Intelligent vision-based malware detection and classification using deep random forest paradigm
Malware is a rapidly increasing menace to modern computing. Malware authors continually
incorporate various sophisticated features like code obfuscations to create malware variants …
incorporate various sophisticated features like code obfuscations to create malware variants …
Cross-architecture bug search in binary executables
J Pewny, B Garmany, R Gawlik… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
With the general availability of closed-source software for various CPU architectures, there is
a need to identify security-critical vulnerabilities at the binary level to perform a vulnerability …
a need to identify security-critical vulnerabilities at the binary level to perform a vulnerability …
A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence
E Amer, I Zelinka - Computers & Security, 2020 - Elsevier
Malware API call graph derived from API call sequences is considered as a representative
technique to understand the malware behavioral characteristics. However, it is troublesome …
technique to understand the malware behavioral characteristics. However, it is troublesome …