A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack

J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge - Computers & Security, 2024 - Elsevier
The continuous proliferation of malware poses a formidable threat to the cyberspace
landscape. Researchers have proffered a multitude of sophisticated defense mechanisms …

AMD‐CNN: Android malware detection via feature graph and convolutional neural networks

RS Arslan, M Tasyurek - Concurrency and Computation …, 2022 - Wiley Online Library
Android malware has become a serious threat to mobile device users, and effective
detection and defence architectures are needed to solve this problem. Recently, machine …

Toward Hardware-Assisted Malware Detection Utilizing Explainable Machine Learning: A Survey

Y Nasser, M Nassar - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware joined the battle against malware by introducing secure boot architectures,
malware-aware processors, and trusted platform modules. Hardware performance …

[HTML][HTML] Diffusion of white-hat botnet using lifespan with controllable ripple effect for malware removal in IoT networks

MA Bin Ahmadon, S Yamaguchi - Sensors, 2023 - mdpi.com
Self-propagating malware has been infecting thousands of IoT devices and causing security
breaches worldwide. Mitigating and cleaning self-propagating malware is important but …

[HTML][HTML] A Malicious Code Detection Method Based on FF-MICNN in the Internet of Things

W Zhang, Y Feng, G Han, H Zhu, X Tan - Sensors, 2022 - mdpi.com
It is critical to detect malicious code for the security of the Internet of Things (IoT). Therefore,
this work proposes a malicious code detection algorithm based on the novel feature fusion …

A Quantitative Logarithmic Transformation-Based Intrusion Detection System

B Lan, TC Lo, R Wei, HY Tang, CK Shieh - Ieee Access, 2023 - ieeexplore.ieee.org
Intrusion detection systems (IDS) play a vital role in protecting networks from malicious
attacks. Modern IDS use machine-learning or deep-learning models to deal with the …

Self-Healing Networks: Adaptive Responses to Ransomware Attacks

G Almeida, F Vasconcelos - 2023 - preprints.org
This study presents an in-depth analysis and evaluation of self-healing networks as an
innovative solution to combat the escalating threat of ransomware attacks. Recognizing the …

Malware and Average Individual

R Alrawili, M Oliva, A Honnef, E Sawall… - 2022 IEEE Asia …, 2022 - ieeexplore.ieee.org
Malware is prevalent throughout the world wide web (WWW), meaning internet users may
encounter malware throughout their lives. With the Malware enlargement and advanced …

Smart OMVI: Obfuscated Malware Variant Identification using a novel dataset

S Qamar - arXiv preprint arXiv:2310.10670, 2023 - arxiv.org
Cybersecurity has become a significant issue in the digital era as a result of the growth in
everyday computer use. Cybercriminals now engage in more than virus distribution and …

[PDF][PDF] Classification of malware using multinomial linked latent modular double q learning

SV Kudrekar, UR Vinayakamurthy - Indonesian Journal of Electrical …, 2022 - academia.edu
In recent times, malware has progressed by utilizing distinct advanced machine learning
techniques for detection. However, the model becomes complicated and the singular value …