[HTML][HTML] A systematic literature review on windows malware detection: Techniques, research issues, and future directions

P Maniriho, AN Mahmood, MJM Chowdhury - Journal of Systems and …, 2024 - Elsevier
The aim of this systematic literature review (SLR) is to provide a comprehensive overview of
the current state of Windows malware detection techniques, research issues, and future …

Evaluation and survey of state of the art malware detection and classification techniques: Analysis and recommendation

P Maniriho, A Mahmood… - Available at SSRN …, 2022 - papers.ssrn.com
Malware attacks are increasing worldwide and are spreading among different platforms
such as desktop and mobile. Malware can potentially damage the compromised system and …

Optimizing Android Program Malware Classification Using GridSearchCV Optimized Random Forest

L Hakim, Z Sari, AR Aristyo… - Kinetik: Game Technology …, 2024 - kinetik.umm.ac.id
The growing number of smartphones, particularly Android powered ones, has increased
public awareness of the security concerns posed by malware and viruses. While machine …

[PDF][PDF] Comprehensive Evaluation of Machine Learning Models for Malware Detection across Diverse Datasets

J Li, S Nouri, R Milroy, RN Akram… - … Security (ICISS 2024), 2024 - aura.abdn.ac.uk
The increasing reliance on the internet and mobile devices in our daily lives, while
revolutionising how we work and interact, has also exposed us to many cybersecurity …

A Survey on Malware Classification using Deep Learning Techniques

E Vani, P Prabhavathy - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Information technology is emerging at fast phase in present environment. The main
concerns for a cyber-attack are Privacy and Security. New malwares are increasing at a very …

Uncovering the Secrets of Stegware: An In-Depth Analysis of Steganography and its Evolving Threat Landscape

M Anitha, M Azhagiri - Human Machine Interaction in the Digital …, 2024 - taylorfrancis.com
Steganography is the technique that hides the information from the plain text and conceals
the secret text. Stegwares are masked into the digital files which are not visible to the naked …

Research on Pain Information Management System Based on Deep Learning

Q Shen, Y Wang, W Fang, L Gong, Z Chen… - … Conference on Multimedia …, 2023 - Springer
The hospital accelerates the construction of the “trinity” of electronic medical records, smart
services, and smart management, and the construction of hospital information …