Deriving common malware behavior through graph clustering
Detection of malicious software (malware) continues to be a problem as hackers devise new
ways to evade available methods. The proliferation of malware and malware variants …
ways to evade available methods. The proliferation of malware and malware variants …
A proactive malicious software identification approach for digital forensic examiners
Digital investigators often get involved with cases, which seemingly point the responsibility
to the person to which the computer belongs, but after a thorough examination malware is …
to the person to which the computer belongs, but after a thorough examination malware is …
The effect of code obfuscation on authorship attribution of binary computer files
S Hendrikse - 2017 - search.proquest.com
In many forensic investigations, questions linger regarding the identity of the authors of the
software specimen. Research has identified methods for the attribution of binary files that …
software specimen. Research has identified methods for the attribution of binary files that …
Malware response naming scheme for security control service
S Lee, W Jung, S Lee, ET Kim - 2020 International Conference …, 2020 - ieeexplore.ieee.org
The Computer Anti-virus Research Organization (CARO) malware naming scheme was
created more than 30 years ago. During the 30 years, the malware naming scheme has …
created more than 30 years ago. During the 30 years, the malware naming scheme has …
Malware detection based on term frequency analysis of GPRs features
F Li, Z Zhu, C Yan, B Chen… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Recently, low-level hardware micro-architecture features are widely used for malware
detection, but they always have redundant information, which will inevitably affect malware …
detection, but they always have redundant information, which will inevitably affect malware …
Local parametric density-based outlier detection and ensemble learning with applications to malware detection
KT Williams - 2016 - search.proquest.com
Local density-based outlier detection has shown to be a powerful tool for detecting outliers
in the unsupervised setting. However, most methods fail to exploit useful information such as …
in the unsupervised setting. However, most methods fail to exploit useful information such as …
[PDF][PDF] ЗАСІБ РОЗПОДІЛЕНОГО ВИЯВЛЕННЯ ЗЛОВМИСНОГО ПРОГРАМНОГО ЗАБЕЗЧЕННЯ ІЗ ВИКОРИСТАННЯМ ТЕХНОЛОГІЇ ЕМУЛЮВАННЯ
ПГ Регіда - Міжнародний науковий комітет, 2022 - dnu.dp.ua
Широке розповсюдження та використання інформаційних технологій спричинило
широке застосування комп'ютерної техніки у багатьох сферах. Водночас, із метою …
широке застосування комп'ютерної техніки у багатьох сферах. Водночас, із метою …
[PDF][PDF] A proactive malicious software identification approach for digital forensic
abstract Digital investigators often get involved with cases, which seemingly point the
responsibility to the person to which the computer belongs, but after a thorough examination …
responsibility to the person to which the computer belongs, but after a thorough examination …
Crypto-Ransomware Detection through the Use of k-Nearest Neighbor Machine Learning Algorithm
NR Wray - 2018 - search.proquest.com
In this quasi-experimental quantitative study, the efficacy of the k-Nearest Neighbor machine
learning algorithm was compared to signature-based antivirus when detecting crypto …
learning algorithm was compared to signature-based antivirus when detecting crypto …