Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art
Malware has been one of the most damaging threats to computers that span across multiple
operating systems and various file formats. To defend against ever-increasing and ever …
operating systems and various file formats. To defend against ever-increasing and ever …
DawnGNN: Documentation augmented windows malware detection using graph neural network
Abstract Application Program Interface (API) calls are widely used in dynamic Windows
malware analysis to characterize the run-time behavior of malware. Researchers have …
malware analysis to characterize the run-time behavior of malware. Researchers have …
Kairos: Practical intrusion detection and investigation using whole-system provenance
Provenance graphs are structured audit logs that describe the history of a system's
execution. Recent studies have explored a variety of techniques to analyze provenance …
execution. Recent studies have explored a variety of techniques to analyze provenance …
A novel deep framework for dynamic malware detection based on API sequence intrinsic features
Dynamic malware detection executes the software in a secured virtual environment and
monitors its run-time behavior. This technique widely uses API sequence analysis to identify …
monitors its run-time behavior. This technique widely uses API sequence analysis to identify …
Malware reverse engineering with large language model for superior code comprehensibility and ioc recommendations
AQ Williamson, M Beauparlant - 2024 - researchsquare.com
Malware reverse engineering, the process of dissecting malicious software to understand its
functionality and behavior, faces significant challenges due to the complexity and …
functionality and behavior, faces significant challenges due to the complexity and …
Dynamic prototype network based on sample adaptation for few-shot malware detection
The continuous increase and spread of malware have caused immeasurable losses to
social enterprises and even the country, especially unknown malware. Most existing …
social enterprises and even the country, especially unknown malware. Most existing …
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning
Abstract Application Programming Interfaces (APIs) are widely considered a useful data
source for dynamic malware analysis to understand the behavioral characteristics of …
source for dynamic malware analysis to understand the behavioral characteristics of …
Android malware detection based on multi-head squeeze-and-excitation residual network
H Zhu, W Gu, L Wang, Z Xu, VS Sheng - Expert Systems with Applications, 2023 - Elsevier
The popularity and flexibility of the Android platform makes it the primary target of malicious
attackers. The behaviors of malware, such as malicious charges and privacy theft, pose …
attackers. The behaviors of malware, such as malicious charges and privacy theft, pose …
A multi-view feature fusion approach for effective malware classification using Deep Learning
The number of malware infected machines from all over the world has been growing day by
day. New malware variants appear in the wild to evade the malware detection and …
day. New malware variants appear in the wild to evade the malware detection and …
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …