Effective methods to detect metamorphic malware: a systematic review

M Irshad, HM Al-Khateeb, A Mansour… - International …, 2018 - inderscienceonline.com
The succeeding code for metamorphic malware is routinely rewritten to remain stealthy and
undetected within infected environments. This characteristic is maintained by means of …

Intelligent Transportation Systems–Models, Challenges, Security Aspects

J Kołodziej, C Hopmann, G Coppa, D Grzonka… - Cybersecurity of Digital …, 2022 - Springer
As cars and other transportation devices become increasingly interconnected, mobility takes
on a new meaning, offering new opportunities. The integration of new communications …

Design and evaluation of a system for network threat signatures generation

P Szynkiewicz, A Kozakiewicz - Journal of computational science, 2017 - Elsevier
The paper addresses a problem of cybersecurity that plays the strategic role in modern
computer networks. The attention is focused on the usage of pre-generated signatures to …

Polymorphic malware detection

NS Selamat, FHM Ali… - 2016 6th International …, 2016 - ieeexplore.ieee.org
The most regular method of detecting malware relies on signature-based detection.
Polymorphic malware pose a serious threat to modern computing. The challenge faced with …

A state of the art survey on polymorphic malware analysis and detection techniques

E Masabo, KS Kaawaase, J Sansa-Otim, J Ngubiri… - 2018 - nru.uncst.go.ug
Nowadays, systems are under serious security threats caused by malicious software,
commonly known as malware. Such malwares are sophisticatedly created with advanced …

NADTW: new approach for detecting TCP worm

M Anbar, R Abdullah, A Munther, MA Al-Betar… - Neural Computing and …, 2017 - Springer
A computer worm is a self-replicating malicious code that does not alter files but resides in
active memory where it duplicates itself. Worms use parts of the operating system that are …

Joanna Kolodziej1, 3 (B), Cornelio Hopmann2, Giovanni Coppa2

D Grzonka, A Widlak - Cybersecurity of Digital Service Chains …, 2022 - books.google.com
As cars and other transportation devices become increasingly interconnected, mobility takes
on a new meaning, offering new opportunities. The integration of new communications …

A Feature Engineering Approach for Classification and Detection of Polymorphic Malware using Machine Learning

E Masabo - 2019 - dr.ur.ac.rw
Malicious software have evolved as a major threat in Computer Systems. These threats aim
at compromising systems from low level to high level, from individuals to large corporations …

[PDF][PDF] Anomaly Detection in TCP/IP Networks

M Krzyszton, P l Szynkiewicz - scs-europe.net
ABSTRACT Intrusion Detection Systems (IDS) should be capable of quickly detecting
attacks and network traffic anomalies to reduce the damage to the network components …

[PDF][PDF] Filtracja i korelacja zdarzeń bezpieczeństwa-modele i metody

P Szynkiewicz, AA Kozakiewicz - Przegląd Elektrotechniczny, 2019 - pe.org.pl
The paper is concerned with the problem of filtration and correlation of security incidents-
suspicious events in computer networks. Each event is specifiable by a set of attributes and …