Malware classification and composition analysis: A survey of recent developments

A Abusitta, MQ Li, BCM Fung - Journal of Information Security and …, 2021 - Elsevier
Malware detection and classification are becoming more and more challenging, given the
complexity of malware design and the recent advancement of communication and …

Intrusion detection of imbalanced network traffic based on machine learning and deep learning

L Liu, P Wang, J Lin, L Liu - IEEE access, 2020 - ieeexplore.ieee.org
In imbalanced network traffic, malicious cyber-attacks can often hide in large amounts of
normal data. It exhibits a high degree of stealth and obfuscation in cyberspace, making it …

ProDroid—An Android malware detection framework based on profile hidden Markov model

SK Sasidharan, C Thomas - Pervasive and Mobile Computing, 2021 - Elsevier
Popularity and openness have made the Android platform a potential target of malware
attacks. The hackers continuously evolve and improve attacking strategies to identify …

Techniques of malware detection: Research review

E Baghirov - 2021 IEEE 15th International Conference on …, 2021 - ieeexplore.ieee.org
Analysis, and detection of malicious software play a crucial role in computer security.
Signature-based malware detection methods were a classical solution in this area …

Data twin-driven cyber-physical factory for smart manufacturing

JS Jwo, CH Lee, CS Lin - Sensors, 2022 - mdpi.com
Because of the complex production processes and technology-intensive operations that take
place in the aerospace and defense industry, introducing Industry 4.0 into the manufacturing …

An efficient two-stage pipeline model with filtering algorithm for mislabeled malware detection

P Kishore, SK Barisal, DP Mohapatra, R Mall - Computers & Security, 2023 - Elsevier
Most malware detectors rely on machine-learning approaches. However, new malware
samples are growing very fast day by day, and their labeling is very expensive …

Semantic neural network ensemble for automated dependency relation extraction from bridge inspection reports

K Liu, N El-Gohary - Journal of Computing in Civil Engineering, 2021 - ascelibrary.org
Bridge inspection reports are important sources of technically detailed data/information
about bridge conditions and maintenance history, yet remain untapped for bridge …

A comparison of word2vec, hmm2vec, and pca2vec for malware classification

A Chandak, W Lee, M Stamp - Malware analysis using artificial intelligence …, 2021 - Springer
Word embeddings are often used in natural language processing as a means to quantify
relationships between words. More generally, these same word embedding techniques can …

Classification of malware from the network traffic using hybrid and deep learning based approach

PR Pardhi, JK Rout, NK Ray, SK Sahu - SN Computer Science, 2024 - Springer
Mobile connectivity and smart devices are spreading worldwide. As a result, the use of
mobile devices and applications is rising exponentially. Therefore, nowadays hackers target …

Emulation versus instrumentation for Android malware detection

A Sinha, F Di Troia, P Heller, M Stamp - … of Internet of Things (IoT) Devices, 2021 - Springer
In resource constrained devices, malware detection is typically based on offline analysis
using emulation. An alternative to such emulation is malware analysis based on code that is …