Malware detection issues, challenges, and future directions: A survey

FA Aboaoja, A Zainal, FA Ghaleb, BAS Al-Rimy… - Applied Sciences, 2022 - mdpi.com
The evolution of recent malicious software with the rising use of digital services has
increased the probability of corrupting data, stealing information, or other cybercrimes by …

Features engineering to differentiate between malware and legitimate software

AY Daeef, A Al-Naji, AK Nahar, J Chahl - Applied Sciences, 2023 - mdpi.com
Malware is the primary attack vector against the modern enterprise. Therefore, it is crucial for
businesses to exclude malware from their computer systems. The most responsive solution …

Next Activity Prediction: An application of shallow learning techniques against deep learning over the BPI Challenge 2020

D Impedovo, G Pirlo, G Semeraro - IEEE Access, 2023 - ieeexplore.ieee.org
Business Process Management is a domain that is composed by different research or
application areas. Process Mining is one of them and it is a data-driven approach to analyze …

Windows malware detection based on static analysis with multiple features

MI Yousuf, I Anwer, A Riasat, KT Zia, S Kim - PeerJ Computer Science, 2023 - peerj.com
Malware or malicious software is an intrusive software that infects or performs harmful
activities on a computer under attack. Malware has been a threat to individuals and …

[HTML][HTML] Sinner: A reward-sensitive algorithm for imbalanced malware classification using neural networks with experience replay

A Coscia, A Iannacone, A Maci, A Stamerra - Information, 2024 - mdpi.com
Reports produced by popular malware analysis services showed a disparity in samples
available for different malware families. The unequal distribution between such classes can …

[PDF][PDF] Handwriting Task-Selection based on the Analysis of Patterns in Classification Results on Alzheimer Dataset.

V Gattulli, D Impedovo, G Pirlo, G Semeraro - DSTNDS, 2023 - ceur-ws.org
Alzheimer's Disease (AD) is a major disease associated with Dementia and a new case of
AD is discovered every three seconds. Research proved that handwriting can be used to …

Multi-type feature extraction and early fusion framework for SMS spam detection

HA Al-Kabbi, MR Feizi-Derakhshi… - IEEE Access, 2023 - ieeexplore.ieee.org
SMS spam is a pervasive issue that affects millions worldwide, leading to significant
inconvenience, time wastage, and potential financial scams. Given the prevalence and …

Analyzing malware from api call sequences using support vector machines

QA Al-Haija, M Krichen - International Conference on Cybersecurity …, 2022 - Springer
Malware (malicious software) are available as software or program that is deliberately
developed to cause disturbance in the computation systems such as computers, servers, or …

[HTML][HTML] MalAware: A tabletop exercise for malware security awareness education and incident response training

G Angafor, I Yevseyeva, L Maglaras - Internet of Things and Cyber-Physical …, 2024 - Elsevier
Advancements in technology, including the Internet of Things (IoT) revolution, have enabled
individuals and businesses to use systems and devices that connect, exchange data, and …

[PDF][PDF] A Study on Malware Detection and Classification Using the Analysis of API Calls Sequences Through Shallow Learning and Recurrent Neural Networks.

A Cannarile, F Carrera, S Galantucci, A Iannacone… - ITASEC, 2022 - ceur-ws.org
Malware detection and classification is a critical issue in cybersecurity. Systems acting
through signatures suffer the problem of not being able to detect attacks via zero-day …