LS Fascí, M Fisichella, G Lax, C Qian - Computers & Security, 2023 - Elsevier
Visualization-based approaches have recently been used in conjunction with signature- based techniques to detect variants of malware files. Indeed, it is sufficient to modify some …
FA Aboaoja, A Zainal, FA Ghaleb… - … Conference on Data …, 2021 - ieeexplore.ieee.org
Recently malware threats are evolved to be the most cyber security threats. Because of obfuscation and evasion techniques, malware has become more sophisticated in terms of …
A AliAhmad, D Eleyan, A Eleyan… - 2023 International …, 2023 - ieeexplore.ieee.org
This paper focuses on the challenges and issues of detecting malware in to-day's world where cyberattacks continue to grow in number and complexity. The paper reviews current …
S Viţel, M Lupaşcu, DT Gavriluţ, H Luchian - International Conference on …, 2022 - Springer
This paper presents a study on the detection performance of MSOffice-embedded malware; the detection models were trained and tested using a very large database of malicious and …
RH Mahdi, H Trabelsi - … on Systems, Signals & Devices (SSD), 2024 - ieeexplore.ieee.org
Malware's continuous advancement and increasing sophistication have made it the most critical issue for the user, resulting in more significant innovation, increasing complexity, and …
R Chanajitt - 2023 - researchcommons.waikato.ac.nz
Malware could be developed and transformed into various forms to deceive users and evade antivirus and security endpoint detection. Furthermore, if one machine in the network …
LS Fascıa, M Fisichellab, G Laxa, C Qianb - researchgate.net
Visualization-based approaches have recently been used in conjunction with signature- based techniques to detect variants of malware files. Indeed, it is sufficient to modify some …