Evaluation of local security event management system vs. standard antivirus software

A Pérez-Sánchez, R Palacios - Applied Sciences, 2022 - mdpi.com
Featured Application This work can be applied to develop new anti-malware strategies
based on event analysis. Abstract The detection and classification of threats in computer …

[PDF][PDF] A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis

R Sihwail, K Omar, KAZ Ariffin - Int. J. Adv. Sci. Eng. Inf. Technol, 2018 - core.ac.uk
The threats malware pose to the people around the world are increasing rapidly. A software
that sneaks to your computer system without your knowledge with a harmful intent to disrupt …

Approach for malware identification using dynamic behaviour and outcome triggering

H Bai, C Hu, X Jing, N Li, X Wang - IET Information Security, 2014 - Wiley Online Library
Malware identification is the process of determining the maliciousness of a program, which
is necessary for detecting malware variants. Although some techniques have been …

Developing an intelligent intrusion detection and prevention system against web application malware

A Alazab, M Hobbs, J Abawajy, A Khraisat - Advances in Security of …, 2013 - Springer
Malware authors are continuously developing crime toolkits. This has led to the situation of
zero-day attacks, where malware harm computer systems despite the protection from …

A survey on different approaches for malware detection using machine learning techniques

S Soja Rani, SR Reeja - Sustainable Communication Networks and …, 2020 - Springer
Malwares are increasing in volume and variety, by posing a big threat to digital world and is
one of the major alarms over the past few years for the security in industries. They can …

A framework for recognition and confronting of obfuscated malwares based on memory dumping and filter drivers

D Javaheri, M Hosseinzadeh - Wireless Personal Communications, 2018 - Springer
In this paper obfuscation techniques used by novel malwares presented and compared. IAT
smashing, string encryption and dynamic programing are explained in static methods and …

Environment–reactive malware behavior: Detection and categorization

S Naval, V Laxmi, MS Gaur, S Raja… - … Workshop on Data …, 2014 - Springer
Present malicious threats have been consolidated in past few years by incorporating diverse
stealthy techniques. Detecting these malwares on the basis of their dynamic behavior has …

[PDF][PDF] A study on malware and malware detection techniques

R Tahir - International Journal of Education and Management …, 2018 - mecs-press.org
The impact of malicious software are getting worse day by day. Malicious software or
malwares are programs that are created to harm, interrupt or damage computers, networks …

Systematic approach to malware analysis (SAMA)

J Bermejo Higuera, C Abad Aramburu… - Applied Sciences, 2020 - mdpi.com
Featured Application The systematic and methodological process of analysis described in
this document will provide a complete understanding of the life cycle of a malware specimen …

Dynamic VSA: a framework for malware detection based on register contents

M Ghiasi, A Sami, Z Salehi - Engineering Applications of Artificial …, 2015 - Elsevier
The number of malware files increases every day because of existing obfuscation
techniques. Researchers recently pursued dynamic analysis to extract runtime behavior of …