A survey on heuristic malware detection techniques

Z Bazrafshan, H Hashemi, SMH Fard… - The 5th conference on …, 2013 - ieeexplore.ieee.org
Malware is a malicious code which is developed to harm a computer or network. The
number of malwares is growing so fast and this amount of growth makes the computer …

High accuracy android malware detection using ensemble learning

SY Yerima, S Sezer, I Muttik - IET Information Security, 2015 - Wiley Online Library
With over 50 billion downloads and more than 1.3 million apps in Google's official market,
Android has continued to gain popularity among smartphone users worldwide. At the same …

Analysis of Bayesian classification‐based approaches for Android malware detection

SY Yerima, S Sezer, G McWilliams - IET Information Security, 2014 - Wiley Online Library
Mobile malware has been growing in scale and complexity spurred by the unabated uptake
of smartphones worldwide. Android is fast becoming the most popular mobile platform …

[HTML][HTML] MalInsight: A systematic profiling based malware detection framework

W Han, J Xue, Y Wang, Z Liu, Z Kong - Journal of Network and Computer …, 2019 - Elsevier
To handle the security threat faced by the widespread use of Internet of Things (IoT) devices
due to the ever-lasting increase of malware, the security researchers increasingly rely on …

Static malware analysis using machine learning methods

HV Nath, BM Mehtre - Recent Trends in Computer Networks and …, 2014 - Springer
Malware analysis forms a critical component of cyber defense mechanism. In the last
decade, lot of research has been done, using machine learning methods on both static as …

Graph embedding as a new approach for unknown malware detection

H Hashemi, A Azmoodeh, A Hamzeh… - Journal of Computer …, 2017 - Springer
Malware is any type of computer program which is developed to harm computers, networks,
and information. Noticeable growth of malware development has made computer and …

Detecting cryptomining using dynamic analysis

D Carlin, P O'kane, S Sezer… - 2018 16th annual …, 2018 - ieeexplore.ieee.org
With the rise in worth and popularity of cryptocurrencies, a new opportunity for criminal gain
is being exploited and with little currently offered in the way of defence. The cost of mining …

Support vector machine meets software defined networking in ids domain

L Boero, M Marchese… - 2017 29th International …, 2017 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) are aimed at analyzing and detecting security problems.
IDS based on anomaly detection and, in particular, on statistical analysis, inspect each traffic …

A new learning approach to malware classification using discriminative feature extraction

Y Liu, YK Lai, ZH Wang, HB Yan - IEEE Access, 2019 - ieeexplore.ieee.org
With the development of the Internet, malware has become one of the most significant
threats. Recognizing specific types of malware is an important step toward effective removal …

Gas estimation and optimization for smart contracts on ethereum

C Li - 2021 36th IEEE/ACM International Conference on …, 2021 - ieeexplore.ieee.org
When users deploy or invoke smart contracts on Ethereum, a fee is charged for avoiding
resource abuse. Metered in gas, the fee is the product of the amount of gas used and the …