Recognition of known malicious patterns through signature-based systems is unsuccessful against malware for which no known signature exists to identify them. These include not only …
CP Chenet, A Savino, S Di Carlo - IEEE Access, 2024 - ieeexplore.ieee.org
This paper delves into the dynamic landscape of computer security, where malware poses a paramount threat. Our focus is a riveting exploration of the recent and promising hardware …
In the realm of cybersecurity, the detection and analysis of obfuscated malware remain a critical challenge, especially in the context of memory dumps. This research paper presents …
In an era where the relentless evolution of cyber threats necessitates the perpetual advancement of security measures, the detection of obfuscated malware has emerged as a …
K Brezinski, K Ferens - 2023 Congress in Computer Science …, 2023 - ieeexplore.ieee.org
This paper presents an approach to malware detection using Graph Neural Networks (GNN) to capture the complex relationships and dependencies between different components of an …
In recent years, the spread of malware has increased exponentially, posing a significant challenge for cybersecurity experts. When facing with the constantly evolving world of …
МИ Стародубов, ИЛ Артемьева… - Вопросы …, 2024 - cyberrus.info
86 of any computer program can be represented as a set of records of its actions in a behavior report, which can be considered as signs of an object. The paper analyzes reports …