MA Rahman, S Islam, YS Nugroho… - … Software and Systems, 2023 - hrcak.srce.hr
Sažetak Computers have become increasingly vulnerable to malicious attacks with an increase in popularity and the proliferation of open system architectures. There are …
The evolution of recent malicious software with the rising use of digital services has increased the probability of corrupting data, stealing information, or other cybercrimes by …
B Xu, Y Li, X Yu - Machine Learning for Cyber Security: Third …, 2020 - Springer
Abstract Machine learning algorithms are widely used in malware detection where successful analysis on static and dynamic features plays a crucial role in process of …
A Almuqren, M Frikha, A Albuali - 2023 IEEE Tenth …, 2023 - ieeexplore.ieee.org
Malware detection relies on the discriminative power of machine learning to identify new variants of malware samples. Automated malware detection, driven by machine learning …
S Ranveer, S Hiray - International Journal of Computer Applications, 2015 - Citeseer
Recent years have encountered massive growth in malwares which poses a severe threat to modern computers and internet security. Existing malware detection systems are confronting …
EK YILMAZ, H BAKIR - Politeknik Dergisi, 2023 - dergipark.org.tr
Smartphones have started to take an essential place in every aspect of our lives with the developing technology. All kinds of transactions, from daily routine work to business …
M Maazalahi, S Hosseini - Journal of AI and Data Mining, 2024 - jad.shahroodut.ac.ir
Detecting and preventing malware infections in systems is become a critical necessity. This paper presents a hybrid method for malware detection, utilizing data mining algorithms such …
N Dabas, P Ahlawat, P Sharma - Arabian Journal for Science and …, 2023 - Springer
With the advent of internet-based technology, there has been a surge in internet-enabled devices. These devices generate massive volumes of meaningful information to accomplish …
XY Zhang, S Wang, L Zhang… - 2016 IEEE Conference …, 2016 - ieeexplore.ieee.org
Malware data are typically depicted with extremely high-dimensional features, which lays an excessive computational burden on detection methods. For the sake of effectiveness and …