In today's interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite …
Y Ye, D Wang, T Li, D Ye, Q Jiang - Journal in computer virology, 2008 - Springer
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based anti-virus systems fail to detect polymorphic …
M Alazab, S Venkataraman… - 2010 second cybercrime …, 2010 - ieeexplore.ieee.org
One of the recent trends adopted by malware authors is to use packers or software tools that instigate code obfuscation in order to evade detection by antivirus scanners. With evasion …
This paper describes EM-Based Detection of Deviations in Program Execution (EDDIE), a new method for detecting anomalies in program execution, such as malware and other code …
YT Hou, Y Chang, T Chen, CS Laih… - expert systems with …, 2010 - Elsevier
The recent development of the dynamic HTML gives attackers a new and powerful technique to compromise computer systems. A malicious dynamic HTML code is usually …
M Al-Qudah, Z Ashi, M Alnabhan… - Journal of Sensor and …, 2023 - mdpi.com
Malware complexity is rapidly increasing, causing catastrophic impacts on computer systems. Memory dump malware is gaining increased attention due to its ability to expose …
J Yagnik, D Strelow, DA Ross… - … Conference on Computer …, 2011 - ieeexplore.ieee.org
Rank correlation measures are known for their resilience to perturbations in numeric values and are widely used in many evaluation metrics. Such ordinal measures have rarely been …
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamorphic …
Power quality disturbances (PQDs) commonly occur in large-scale power systems and networks that rise critical issues. Therefore, an automated recognition and mitigation of …