Malware detection issues, challenges, and future directions: A survey
The evolution of recent malicious software with the rising use of digital services has
increased the probability of corrupting data, stealing information, or other cybercrimes by …
increased the probability of corrupting data, stealing information, or other cybercrimes by …
Features engineering to differentiate between malware and legitimate software
Malware is the primary attack vector against the modern enterprise. Therefore, it is crucial for
businesses to exclude malware from their computer systems. The most responsive solution …
businesses to exclude malware from their computer systems. The most responsive solution …
Next Activity Prediction: An application of shallow learning techniques against deep learning over the BPI Challenge 2020
Business Process Management is a domain that is composed by different research or
application areas. Process Mining is one of them and it is a data-driven approach to analyze …
application areas. Process Mining is one of them and it is a data-driven approach to analyze …
Windows malware detection based on static analysis with multiple features
Malware or malicious software is an intrusive software that infects or performs harmful
activities on a computer under attack. Malware has been a threat to individuals and …
activities on a computer under attack. Malware has been a threat to individuals and …
[HTML][HTML] Sinner: A reward-sensitive algorithm for imbalanced malware classification using neural networks with experience replay
Reports produced by popular malware analysis services showed a disparity in samples
available for different malware families. The unequal distribution between such classes can …
available for different malware families. The unequal distribution between such classes can …
[PDF][PDF] Handwriting Task-Selection based on the Analysis of Patterns in Classification Results on Alzheimer Dataset.
Alzheimer's Disease (AD) is a major disease associated with Dementia and a new case of
AD is discovered every three seconds. Research proved that handwriting can be used to …
AD is discovered every three seconds. Research proved that handwriting can be used to …
Multi-type feature extraction and early fusion framework for SMS spam detection
HA Al-Kabbi, MR Feizi-Derakhshi… - IEEE Access, 2023 - ieeexplore.ieee.org
SMS spam is a pervasive issue that affects millions worldwide, leading to significant
inconvenience, time wastage, and potential financial scams. Given the prevalence and …
inconvenience, time wastage, and potential financial scams. Given the prevalence and …
Analyzing malware from api call sequences using support vector machines
QA Al-Haija, M Krichen - International Conference on Cybersecurity …, 2022 - Springer
Malware (malicious software) are available as software or program that is deliberately
developed to cause disturbance in the computation systems such as computers, servers, or …
developed to cause disturbance in the computation systems such as computers, servers, or …
[HTML][HTML] MalAware: A tabletop exercise for malware security awareness education and incident response training
Advancements in technology, including the Internet of Things (IoT) revolution, have enabled
individuals and businesses to use systems and devices that connect, exchange data, and …
individuals and businesses to use systems and devices that connect, exchange data, and …
[PDF][PDF] A Study on Malware Detection and Classification Using the Analysis of API Calls Sequences Through Shallow Learning and Recurrent Neural Networks.
A Cannarile, F Carrera, S Galantucci, A Iannacone… - ITASEC, 2022 - ceur-ws.org
Malware detection and classification is a critical issue in cybersecurity. Systems acting
through signatures suffer the problem of not being able to detect attacks via zero-day …
through signatures suffer the problem of not being able to detect attacks via zero-day …