ProDroid—An Android malware detection framework based on profile hidden Markov model

SK Sasidharan, C Thomas - Pervasive and Mobile Computing, 2021 - Elsevier
Popularity and openness have made the Android platform a potential target of malware
attacks. The hackers continuously evolve and improve attacking strategies to identify …

A survey of machine learning algorithms and their application in information security

M Stamp - Guide to vulnerability analysis for computer networks …, 2018 - Springer
A Survey of Machine Learning Algorithms and Their Application in Information Security |
SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal …

Aphmm: Accelerating profile hidden markov models for fast and energy-efficient genome analysis

C Firtina, K Pillai, GS Kalsi, B Suresh, DS Cali… - ACM Transactions on …, 2024 - dl.acm.org
Profile hidden Markov models (pHMMs) are widely employed in various bioinformatics
applications to identify similarities between biological sequences, such as DNA or protein …

Detecting malware activity using public search data

I Villanueva-Miranda, M Akbar - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
The prevalence of malware on the Internet makes malware detection vital as an early
warning system for organizations' security. This paper presents a novel approach to linking …

Modeling and predicting emerging threats using disparate data

I Villanueva-Miranda - 2023 - search.proquest.com
Early detection is crucial to mitigate the impact of emerging threats. This work proposes four
innovative frameworks that build machine learning and deterministic epidemiological …

Dynamic IoT malware detection in Android systems using profile hidden Markov models

N Abanmi, H Kurdi, M Alzamel - Applied Sciences, 2022 - mdpi.com
The prevalence of malware attacks that target IoT systems has raised an alarm and
highlighted the need for efficient mechanisms to detect and defeat them. However, detecting …

Malware classification using dynamic features and Hidden Markov Model

M Imran, MT Afzal, MA Qadir - Journal of Intelligent & Fuzzy …, 2016 - content.iospress.com
In recent years the number of new malware threats has increased significantly, causing a
damage of billions of dollars globally. To counter this aggressive malware attack, the anti …

Study of soft computing methods for large-scale multinomial malware types and families detection

LS Grini, A Shalaginov, K Franke - … and the New Direction in Soft …, 2018 - Springer
There exist different methods of malware identification, while the most common is signature-
based used by anti-virus vendors that includes one-way cryptographic hash sums to …

A survey on metamorphic malware detection based on hidden Markov model

S kumar Sasidharan, C Thomas - … International conference on …, 2018 - ieeexplore.ieee.org
The phenomenon of information security threats increases every day. The statistical reports
from antivirus companies show that attackers use malicious applications as one of the major …

[PDF][PDF] Profile Hidden Markov Model Malware Detection and API Call Obfuscation.

M Ali, M Hamid, J Jasser, J Lerman, S Shetty, F Di Troia - ICISSP, 2022 - scitepress.org
Profile Hidden Markov Models (PHMM) have been used to detect malware samples based
on their behavior on the host system and obtained promising results. Since PHMMs are a …