Deriving common malware behavior through graph clustering

Y Park, D Reeves - Proceedings of the 6th ACM Symposium on …, 2011 - dl.acm.org
Detection of malicious software (malware) continues to be a problem as hackers devise new
ways to evade available methods. The proliferation of malware and malware variants …

A proactive malicious software identification approach for digital forensic examiners

M Ali, S Shiaeles, N Clarke, D Kontogeorgis - Journal of Information …, 2019 - Elsevier
Digital investigators often get involved with cases, which seemingly point the responsibility
to the person to which the computer belongs, but after a thorough examination malware is …

The effect of code obfuscation on authorship attribution of binary computer files

S Hendrikse - 2017 - search.proquest.com
In many forensic investigations, questions linger regarding the identity of the authors of the
software specimen. Research has identified methods for the attribution of binary files that …

Malware response naming scheme for security control service

S Lee, W Jung, S Lee, ET Kim - 2020 International Conference …, 2020 - ieeexplore.ieee.org
The Computer Anti-virus Research Organization (CARO) malware naming scheme was
created more than 30 years ago. During the 30 years, the malware naming scheme has …

Malware detection based on term frequency analysis of GPRs features

F Li, Z Zhu, C Yan, B Chen… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Recently, low-level hardware micro-architecture features are widely used for malware
detection, but they always have redundant information, which will inevitably affect malware …

Local parametric density-based outlier detection and ensemble learning with applications to malware detection

KT Williams - 2016 - search.proquest.com
Local density-based outlier detection has shown to be a powerful tool for detecting outliers
in the unsupervised setting. However, most methods fail to exploit useful information such as …

[PDF][PDF] ЗАСІБ РОЗПОДІЛЕНОГО ВИЯВЛЕННЯ ЗЛОВМИСНОГО ПРОГРАМНОГО ЗАБЕЗЧЕННЯ ІЗ ВИКОРИСТАННЯМ ТЕХНОЛОГІЇ ЕМУЛЮВАННЯ

ПГ Регіда - Міжнародний науковий комітет, 2022 - dnu.dp.ua
Широке розповсюдження та використання інформаційних технологій спричинило
широке застосування комп'ютерної техніки у багатьох сферах. Водночас, із метою …

[PDF][PDF] A proactive malicious software identification approach for digital forensic

M Ali, S Shiaeles, N Clarke, D Kontogeorgis, M Ali… - 2019 - pure.plymouth.ac.uk
abstract Digital investigators often get involved with cases, which seemingly point the
responsibility to the person to which the computer belongs, but after a thorough examination …

Crypto-Ransomware Detection through the Use of k-Nearest Neighbor Machine Learning Algorithm

NR Wray - 2018 - search.proquest.com
In this quasi-experimental quantitative study, the efficacy of the k-Nearest Neighbor machine
learning algorithm was compared to signature-based antivirus when detecting crypto …