Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on malware detection using data mining techniques
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …
serious and evolving security threats to Internet users. To protect legitimate users from these …
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding
J Zhang, Z Qin, H Yin, L Ou, K Zhang - Computers & Security, 2019 - Elsevier
Being able to detect malware variants is a critical problem due to the potential damages and
the fast paces of new malware variations. According to surveys from McAfee and Symantec …
the fast paces of new malware variations. According to surveys from McAfee and Symantec …
Adversarial machine learning in malware detection: Arms race between evasion attack and defense
Since malware has caused serious damages and evolving threats to computer and Internet
users, its detection is of great interest to both anti-malware industry and researchers. In …
users, its detection is of great interest to both anti-malware industry and researchers. In …
Gotcha-sly malware! scorpion a metagraph2vec based malware detection system
Due to its severe damages and threats to the security of the Internet and computing devices,
malware detection has caught the attention of both anti-malware industry and researchers …
malware detection has caught the attention of both anti-malware industry and researchers …
Securedroid: Enhancing security of machine learning-based detection against adversarial android malware attacks
With smart phones being indispensable in people's everyday life, Android malware has
posed serious threats to their security, making its detection of utmost concern. To protect …
posed serious threats to their security, making its detection of utmost concern. To protect …
A survey on cross-architectural IoT malware threat hunting
In recent years, the increase in non-Windows malware threats had turned the focus of the
cybersecurity community. Research works on hunting Windows PE-based malwares are …
cybersecurity community. Research works on hunting Windows PE-based malwares are …
Dalvik opcode graph based android malware variants detection using global topology features
J Zhang, Z Qin, K Zhang, H Yin, J Zou - IEEE Access, 2018 - ieeexplore.ieee.org
Since Android has become the dominator of smartphone operating system market with a
share of 86.8%, the number of Android malicious applications are increasing rapidly as well …
share of 86.8%, the number of Android malicious applications are increasing rapidly as well …
MalSensor: Fast and Robust Windows Malware Classification
H Zhao, Y Wu, D Zou, Y Liu, H ** - ACM Transactions on Software …, 2024 - dl.acm.org
Driven by the substantial profits, the evolution of Portable Executable (PE) malware has
posed persistent threats. PE malware classification has been an important research field …
posed persistent threats. PE malware classification has been an important research field …
Web Scale Graph Mining for Cyber Threat Intelligence
Defending against today's increasingly sophisticated and large-scale cyberattacks demands
accurate, real-time threat intelligence. Traditional approaches struggle to scale, integrate …
accurate, real-time threat intelligence. Traditional approaches struggle to scale, integrate …
Automatic application identification from billions of files
Understanding how to group a set of binary files into the piece of software they belong to is
highly desirable for software profiling, malware detection, or enterprise audits, among many …
highly desirable for software profiling, malware detection, or enterprise audits, among many …