J Singh, J Singh - Journal of Systems Architecture, 2021 - Elsevier
In last decade, a proliferation growth in the development of computer malware has been done. Nowadays, cybercriminals (attacker) use malware as a weapon to carry out the …
The adoption of network traffic encryption is continually growing. Popular applications use encryption protocols to secure communications and protect the privacy of users. In addition …
Z Li, K Zhang, Y Xie, F Yu, XF Wang - … of the 2012 ACM conference on …, 2012 - dl.acm.org
With the Internet becoming the dominant channel for marketing and promotion, online advertisements are also increasingly used for illegal purposes such as propagating …
These days, cloud computing is one of the most promising technologies to store information and provide services online efficiently. Using this rapidly developing technology to protect …
H Bakır, R Bakır - Computers and Electrical Engineering, 2023 - Elsevier
Android Malware detection became a hot topic over the last several years. Although considerable studies have been conducted utilizing machine learning-based methods, little …
DJ Dean, H Nguyen, X Gu - … of the 9th international conference on …, 2012 - dl.acm.org
Infrastructure-as-a-Service (IaaS) clouds are prone to performance anomalies due to their complex nature. Although previous work has shown the effectiveness of using statistical …
H Sun, X Wang, R Buyya, J Su - Software: Practice and …, 2017 - Wiley Online Library
Because of the rapid increasing of malware attacks on the Internet of Things in recent years, it is critical for resource‐constrained devices to guard against potential risks. The traditional …
C Noyes - arXiv preprint arXiv:1601.01405, 2016 - arxiv.org
I present the design and implementation of a novel anti-malware environment called BitAV. BitAV allows for the decentralization of the update and maintenance mechanisms of the …
As the malware research field became more established over the last two decades, new research questions arose, such as how to make malware research reproducible, how to …