[HTML][HTML] Ransomware detection using random forest technique
BM Khammas - ICT Express, 2020 - Elsevier
Nowadays, the ransomware became a serious threat challenge the computing world that
requires an immediate consideration to avoid financial and moral blackmail. So, there is a …
requires an immediate consideration to avoid financial and moral blackmail. So, there is a …
Csmc: A secure and efficient visualized malware classification method inspired by compressed sensing
W Wu, H Peng, H Zhu, D Zhang - Sensors, 2024 - mdpi.com
With the rapid development of the Internet of Things (IoT), the sophistication and intelligence
of sensors are continually evolving, playing increasingly important roles in smart homes …
of sensors are continually evolving, playing increasingly important roles in smart homes …
Comparative analysis of various machine learning algorithms for ransomware detection
BM Khammas - TELKOMNIKA (Telecommunication Computing …, 2022 - telkomnika.uad.ac.id
Recently, the ransomware attack posed a serious threat that targets a wide range of
organizations and individuals for financial gain. So, there is a real need to initiate more …
organizations and individuals for financial gain. So, there is a real need to initiate more …
MSG: Missing-sequence generator for metamorphic malware detection
RK Koppanati, SK Peddoju - Journal of Information Security and …, 2025 - Elsevier
Metamorphic malware is a sophisticated malware that frequently modifies its code to avoid
being detected by signature-based methods while maintaining the same output during the …
being detected by signature-based methods while maintaining the same output during the …
Structural features with nonnegative matrix factorization for metamorphic malware detection
Metamorphic malware is well known for evading signature-based detection by exploiting
various code obfuscation techniques. Current metamorphic malware detection approaches …
various code obfuscation techniques. Current metamorphic malware detection approaches …
Nonnegative matrix factorization and metamorphic malware detection
Metamorphic malware change their internal code structure by adopting code obfuscation
technique while maintaining their malicious functionality during each infection. This causes …
technique while maintaining their malicious functionality during each infection. This causes …
Accuracy improved malware detection method using snort sub-signatures and machine learning techniques
Malware is a major computer security concern as many computing systems are connected to
the Internet. The number of malware has increased over the years and a new malware has …
the Internet. The number of malware has increased over the years and a new malware has …
The performance of iot malware detection technique using feature selection and feature reduction in fog layer
BM Khammas - IOP Conference Series: Materials Science and …, 2020 - iopscience.iop.org
The rapid increase in the number of devices connected to internet (IoT) lead to expansion in
the attacks that targeting these devices. One of these dangers attacks is malware which …
the attacks that targeting these devices. One of these dangers attacks is malware which …
Pre-filters in-transit malware packets detection in the network
Conventional malware detection systems cannot detect most of the new malware in the
network without the availability of their signatures. In order to solve this problem, this paper …
network without the availability of their signatures. In order to solve this problem, this paper …
A generative neural network for improving metamorphic malware detection in IoT mobile devices
There has been an upsurge in malicious attacks in recent years, impacting computer
systems and networks. More and more novel malware families aimed at information assets …
systems and networks. More and more novel malware families aimed at information assets …