Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits
K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …
changing battlefield over who can innovate over the other. While security analysts are …
Characterizing malicious android apps by mining topic-specific data flow signatures
Abstract Context: State-of-the-art works on automated detection of Android malware have
leveraged app descriptions to spot anomalies wrt the functionality implemented, or have …
leveraged app descriptions to spot anomalies wrt the functionality implemented, or have …
MSG: Missing-sequence generator for metamorphic malware detection
RK Koppanati, SK Peddoju - Journal of Information Security and …, 2025 - Elsevier
Metamorphic malware is a sophisticated malware that frequently modifies its code to avoid
being detected by signature-based methods while maintaining the same output during the …
being detected by signature-based methods while maintaining the same output during the …
Structural features with nonnegative matrix factorization for metamorphic malware detection
Metamorphic malware is well known for evading signature-based detection by exploiting
various code obfuscation techniques. Current metamorphic malware detection approaches …
various code obfuscation techniques. Current metamorphic malware detection approaches …
Metamorphic malware detection using linear discriminant analysis and graph similarity
The most common malware detection approaches which are based on signature matching
and are not sufficient for metamorphic malware detection, since virus kits and metamorphic …
and are not sufficient for metamorphic malware detection, since virus kits and metamorphic …
Exploring the usage of topic modeling for android malware static analysis
The rapid growth in smartphone and tablet usage over the last years has led to the
inevitable rise in targeting of these devices by cyber-criminals. The exponential growth of …
inevitable rise in targeting of these devices by cyber-criminals. The exponential growth of …
Proposing an HMM-based approach to detect metamorphic malware
M Gharacheh, V Derhami, S Hashemi… - 2015 4th Iranian Joint …, 2015 - ieeexplore.ieee.org
Previous research has shown that hidden Markov model (HMM) is a compelling option for
malware identification. However, some advanced metamorphic malware have proven to be …
malware identification. However, some advanced metamorphic malware have proven to be …
[PDF][PDF] Detection of metamorphic malware based on hmm: A hierarchical approach
M Gharacheh, V Derhami, S Hashemi… - International Journal of …, 2016 - academia.edu
Markov model (HMM) is a persuasive option for malware detection. However, some
advanced metamorphic malware are able to overcome the traditional methods based on …
advanced metamorphic malware are able to overcome the traditional methods based on …
Evolutionary Based Transfer Learning Approach to Improving Classification of Metamorphic Malware
The proliferation of metamorphic malware has recently gained a lot of research interest. This
is because of their ability to transform their program codes stochastically. Several detectors …
is because of their ability to transform their program codes stochastically. Several detectors …
Metamorphic virus detection using feature selection techniques
In this article, a non-signature based statistical scanner for metamorphic malware detection,
employing feature ranking methods like Term Frequency-Inverse Document Frequency …
employing feature ranking methods like Term Frequency-Inverse Document Frequency …