Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Opcodes as predictor for malware
D Bilar - International journal of electronic security and …, 2007 - inderscienceonline.com
This paper discusses a detection mechanism for malicious code through statistical analysis
of opcode distributions. A total of 67 malware executables were sampled statically …
of opcode distributions. A total of 67 malware executables were sampled statically …
Profiling and classifying the behavior of malicious codes
M Alazab - Journal of Systems and Software, 2015 - Elsevier
Malware is a major security threat confronting computer systems and networks and has
increased in scale and impact from the early days of ICT. Traditional protection mechanisms …
increased in scale and impact from the early days of ICT. Traditional protection mechanisms …
Leveraging support vector machine for opcode density based detection of crypto-ransomware
J Baldwin, A Dehghantanha - Cyber threat intelligence, 2018 - Springer
Ransomware is a significant global threat, with easy deployment due to the prevalent
ransomware-as-a-service model. Machine learning algorithms incorporating the use of …
ransomware-as-a-service model. Machine learning algorithms incorporating the use of …
SVM training phase reduction using dataset feature filtering for malware detection
N-gram analysis is an approach that investigates the structure of a program using bytes,
characters, or text strings. A key issue with N-gram analysis is feature selection amidst the …
characters, or text strings. A key issue with N-gram analysis is feature selection amidst the …
Systems and methods for detecting copied computer code using fingerprints
DJ Rogers, M Moore, D Blazakis - US Patent 9,459,861, 2016 - Google Patents
8, 140,850 B2 3/2012 Horne et al. 8,214,497 B2 7/2012 Alperovitch et al. 8,365,277 B2
1/2013 Kim et al. 8,370,634 B2 2/2013 Horne et al. 8,495,755 B2 7, 2013 ** et al. 8,533,848 …
1/2013 Kim et al. 8,370,634 B2 2/2013 Horne et al. 8,495,755 B2 7, 2013 ** et al. 8,533,848 …
Detecting obfuscated malware using reduced opcode set and optimised runtime trace
The research presented, investigates the optimal set of operational codes (opcodes) that
create a robust indicator of malicious software (malware) and also determines a program's …
create a robust indicator of malicious software (malware) and also determines a program's …
A hybrid set of complexity metrics for large-scale object-oriented software systems
Large-scale object-oriented (OO) software systems have recently been found to share global
network characteristics such as small world and scale free, which go beyond the scope of …
network characteristics such as small world and scale free, which go beyond the scope of …
N-gram density based malware detection
N-gram analysis is an approach that investigates the structure of a program using bytes,
characters or text strings. This research uses dynamic analysis to investigate malware …
characters or text strings. This research uses dynamic analysis to investigate malware …
Malware detection: program run length against detection rate
N‐gram analysis is an approach that investigates the structure of a program using bytes,
characters or text strings. This research uses dynamic analysis to investigate malware …
characters or text strings. This research uses dynamic analysis to investigate malware …
Static signature-based malware detection using opcode and binary information
Internet continues to evolve and touches every aspect of our daily life thus communications
through internet is becoming inevitable. Computer security has been hence becoming one …
through internet is becoming inevitable. Computer security has been hence becoming one …