Analysing the Malware by using Checksum and Signature-Based Detection Techniques.

MM Reddy, S Raghava, NN Tarun… - … of Engineering & …, 2023 - search.ebscohost.com
Malware has become an increasingly widespread security hazard to the internet in today's
society. Malware is any harmful program that is designed to cause harm to the user …

Inteligencia Artificial para la detección de binarios maliciosos

J Díaz Navarro - 2022 - openaccess.uoc.edu
La ejecución de malware en los sistemas informáticos es un problema que afecta a toda la
sociedad y cuyas consecuencias económicas no dejan de aumentar año tras año. La …

Antivirus performance in detecting Metasploit payloads: A Case Study on Anti-Virus Effectiveness

E Nyberg, L Dinis Ferreira - 2023 - diva-portal.org
This paper will focus solely on the effectiveness of AV (antivirus) in detecting Metasploit
payloads which have been encapsulated with different encapsulation modules. There …

Hybrid Framework for Ransomware Protection Using Effective Decoy Deployment and File Traversal Entropy Check

T Kim, E Im - Available at SSRN 4496374 - papers.ssrn.com
Ransomware is one of the world's fastest-growing malware. Attackers encrypt a user's files
using ransomware and hold the decryption key until a ransom is paid by the victim …

Implementing Selective Signature Scanning to Optimize Malware Detection

LG Wilbur - 2024 - digitalcommons.dartmouth.edu
Signature scanning is one of the oldest types of malware detection, and it remains an
essential lightweight detection method for many antivirus programs. However, signature …

A topic modeling-based approach to executable file malware detection

W Hilal, C Wilkinson, N Alsadi… - Disruptive …, 2022 - spiedigitallibrary.org
Malware is a term that refers to any malicious software used to harm or exploit a device,
service, or network. The presence of malware in a system can disrupt operations and the …

Intelli-Dynamic Malware Detection Based on Processor Behaviors

J Pattee, BK Lee - … on Information Technology–New Generations (ITNG …, 2020 - Springer
The number of malicious programs and potentially unwanted applications continues to rise
annually with the total number of malwares approaching one billion in 2020. In addition …

[PDF][PDF] Technische Aspekte zur Absicherung von Unternehmensnetzwerken

J Glanzer - 2022 - opus.campus02.at
Die IT ist aus modernen Unternehmen nicht mehr wegzudenken. Sämtliche elektronische
Kommunikation ist ohne die entsprechende Infrastruktur unmöglich und für Unternehmen …

[PDF][PDF] Techno-Science Research Journal

V Korn, KSD Valy - techno-srj.itc.edu.kh
With the growth of usage of Docker containers in the recent year, Vulnerability scanning is
essential to scanning and detecting known flaws and vulnerabilities in that specific Docker …

[PDF][PDF] BRND UNIVERSITY DF TECHNOLOGY

BA Ludes - theses.cz
The thesis explores cloud-native architecture, anomaly detection techniques, machine
learning, and data analysis to develop an anomaly detection model for audit logs from the …