A survey of the recent trends in deep learning based malware detection

UH Tayyab, FB Khan, MH Durad, A Khan… - Journal of Cybersecurity …, 2022 - mdpi.com
Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying
malicious activity. Malicious activities potentially lead to a system breach or data …

A survey on heuristic malware detection techniques

Z Bazrafshan, H Hashemi, SMH Fard… - The 5th conference on …, 2013 - ieeexplore.ieee.org
Malware is a malicious code which is developed to harm a computer or network. The
number of malwares is growing so fast and this amount of growth makes the computer …

The security and privacy of mobile edge computing: An artificial intelligence perspective

C Wang, Z Yuan, P Zhou, Z Xu, R Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Mobile-edge computing (MEC) is a new computing paradigm that enables cloud computing
and information technology (IT) services to be delivered at the network's edge. By shifting …

On the use of artificial malicious patterns for android malware detection

M Jerbi, ZC Dagdia, S Bechikh, LB Said - Computers & Security, 2020 - Elsevier
Malware programs currently represent the most serious threat to computer information
systems. Despite the performed efforts of researchers in this field, detection tools still have …

[PDF][PDF] Malware detection based on hybrid signature behaviour application programming interface call graph

AAE Elhadi, MA Maarof, AH Osman - American Journal of Applied …, 2012 - Citeseer
Problem statement: A malware is a program that has malicious intent. Nowadays, malware
authors apply several sophisticated techniques such as packing and obfuscation to avoid …

Neural malware analysis with attention mechanism

H Yakura, S Shinozaki, R Nishimura, Y Oyama… - Computers & …, 2019 - Elsevier
Objectives: In order to confront diverse types of malware that evolve from moment to
moment, it is important to instantly acquire deep knowledge related to the characteristics of …

Effective methods to detect metamorphic malware: a systematic review

M Irshad, HM Al-Khateeb, A Mansour… - International …, 2018 - inderscienceonline.com
The succeeding code for metamorphic malware is routinely rewritten to remain stealthy and
undetected within infected environments. This characteristic is maintained by means of …

Enhancing the detection of metamorphic malware using call graphs

AAE Elhadi, MA Maarof, BIA Barry, H Hamza - computers & security, 2014 - Elsevier
Malware stands for malicious software. It is software that is designed with a harmful intent. A
malware detector is a system that attempts to identify malware using Application …

Malware detection by behavioural sequential patterns

M Ahmadi, A Sami, H Rahimi, B Yadegari - Computer Fraud & Security, 2013 - Elsevier
For many years, malware has been the subject of intensive study by researchers in industry
and academia. Malware production, while not being an organised business, has reached a …

DLLMiner: structural mining for malware detection

M Narouei, M Ahmadi, G Giacinto… - Security and …, 2015 - Wiley Online Library
Existing anti‐malware products usually use signature‐based techniques as their main
detection engine. Although these methods are very fast, they are unable to provide effective …