|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 774 occurrences of 392 keywords
|
|
|
Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
9 | Yiming Hei, Renyu Yang, Hao Peng 0001, Lihong Wang, Xiaolin Xu, Jianwei Liu 0001, Hong Liu 0006, Jie Xu, Lichao Sun 0001 |
Hawk: Rapid Android Malware Detection Through Heterogeneous Graph Attention Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Neural Networks Learn. Syst. ![In: IEEE Trans. Neural Networks Learn. Syst. 35(4), pp. 4703-4717, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Deqiang Li, Shicheng Cui, Yun Li 0009, Jia Xu 0003, Fu Xiao 0001, Shouhuai Xu |
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 21(2), pp. 920-936, March - April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Antonio Maci, Giuseppe Urbano, Antonio Coscia |
Deep Q-Networks for Imbalanced Multi-Class Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024., pp. 342-349, 2024, SCITEPRESS, 978-989-758-683-5. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Dakouri Gazo, Asma Patel, Mohammad Hasan |
Effectiveness of Malware Incident Management in Security Operations Centres: Trends, Challenges and Research Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024., pp. 162-169, 2024, SCITEPRESS, 978-989-758-683-5. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Md. Mahbubur Rahman, Md Delwar Hossain, Hideya Ochiai, Youki Kadobayashi, Tanjim Sakib, Syed Taha Yeasin Ramadan |
Vision Based Malware Classification Using Deep Neural Network with Hybrid Data Augmentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024., pp. 823-830, 2024, SCITEPRESS, 978-989-758-683-5. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Mohammed Jawed, Sriram Parameshwaran, Nitesh Kumar, Anand Handa, Sandeep K. Shukla |
ArkThor: Threat Categorization Based on Malware's C2 Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024., pp. 203-210, 2024, SCITEPRESS, 978-989-758-683-5. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Arunab Singh, Maryam Tanha, Yashsvi Girdhar, Aaron Hunter 0001 |
Interpretable Android Malware Detection Based on Dynamic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024., pp. 195-202, 2024, SCITEPRESS, 978-989-758-683-5. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Nahid Ferdous Aurna, Md Delwar Hossain, Hideya Ochiai, Yuzo Taenaka, Latifur Khan, Youki Kadobayashi |
Banking Malware Detection: Leveraging Federated Learning with Conditional Model Updates and Client Data Heterogeneity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024., pp. 309-319, 2024, SCITEPRESS, 978-989-758-683-5. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Phuc Hao Do, Duc Tran Le, Vladimir M. Vishnevsky, Aleksandr Berezkin, Ruslan Kirichek |
A Horizontal Federated Learning Approach to IoT Malware Traffic Detection: An Empirical Evaluation with N-BaIoT Dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACT ![In: 26th International Conference on Advanced Communications Technology, ICACT 2024, Pyeong Chang, Republic of Korea, February 4-7, 2024, pp. 1494-1506, 2024, IEEE, 979-11-88428-12-0. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Tisha Chawla, Saifur Rahman 0002, Shantanu Pal, Chandan K. Karmakar |
A Robust Feature Integration for Multiclass Metamorphic Malware Detection in IoT Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSNETS ![In: 16th International Conference on COMmunication Systems & NETworkS, COMSNETS 2024, Bengaluru, India, January 3-7, 2024, pp. 412-414, 2024, IEEE, 979-8-3503-8311-9. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Jingwen Wang, Peilong Li, Ethan Weitkamp, Yusuke Satani, Adam Omundsen |
MalBuster: Scalable, Real-Time, and Concept Drift-Adaptive Malware Detection for Smart Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 21st IEEE Consumer Communications & Networking Conference, CCNC 2024, Las Vegas, NV, USA, January 6-9, 2024, pp. 352-355, 2024, IEEE, 979-8-3503-0457-2. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Naoki Fukushi, Toshiki Shibahara, Hiroki Nakano, Takashi Koide, Daiki Chiba 0001 |
Noisy Label Detection for Multi-labeled Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 21st IEEE Consumer Communications & Networking Conference, CCNC 2024, Las Vegas, NV, USA, January 6-9, 2024, pp. 165-171, 2024, IEEE, 979-8-3503-0457-2. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Radu Stefan Mihalache, Dragos Teodor Gavrilut, Anton Dan Gabriel |
Real-Time Deep Learning-Based Malware Detection Using Static and Dynamic Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAART (3) ![In: Proceedings of the 16th International Conference on Agents and Artificial Intelligence, ICAART 2024, Volume 3, Rome, Italy, February 24-26, 2024., pp. 226-234, 2024, SCITEPRESS, 978-989-758-680-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | John Carter, Spiros Mancoridis, Pavlos Protopapas, Erick Galinkin |
Behavioral Malware Detection using a Language Model Classifier Trained on sys2vec Embeddings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 57th Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, pp. 7582-7591, 2024, ScholarSpace, 978-0-9981331-7-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
9 | John Carter, Spiros Mancoridis, Pavlos Protopapas, Erick Galinkin |
IoT Malware Data Augmentation using a Generative Adversarial Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 57th Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, pp. 7572-7581, 2024, ScholarSpace, 978-0-9981331-7-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
9 | Inzamamul Alam, Md. Samiullah 0001, Upama Kabir, Simon Woo, Carson K. Leung, Hoang Hai Nguyen |
SREMIC: Spatial Relation Extraction-based Malware Image Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMCOM ![In: 18th International Conference on Ubiquitous Information Management and Communication, IMCOM 2024, Kuala Lumpur, Malaysia, January 3-5, 2024, pp. 1-8, 2024, IEEE, 979-8-3503-3101-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Cuiying Gao, Gaozhun Huang, Heng Li 0008, Bang Wu, Yueming Wu, Wei Yuan |
A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, ICSE 2024, Lisbon, Portugal, April 14-20, 2024, pp. 12:1-12:13, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Minhajul Alam Rahat, Vijay Banerjee, Gedare Bloom, Yanyan Zhuang |
Cimalir: Cross-Platform IoT Malware Clustering using Intermediate Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 14th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2024, Las Vegas, NV, USA, January 8-10, 2024, pp. 460-466, 2024, IEEE, 979-8-3503-6013-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Hamzah Al-Qadasi, Djafer Yahia Messaoud Benchadi, Salim Chehida, Kazuhiro Fukui, Saddek Bensalem |
Neural Network Innovations in Image-Based Malware Classification: A Comparative Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (4) ![In: Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 4, pp. 252-265, 2024, Springer, 978-3-031-57915-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Baskoro Adi Pratomo, Stefanus A. Kosim, Hudan Studiawan, Angela O. Prabowo |
BarongTrace: A Malware Event Log Dataset for Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (4) ![In: Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 4, pp. 48-60, 2024, Springer, 978-3-031-57915-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Rildo Antonio de Souza, Vitor de Castro-Silva, Sylvio Barbon Junior, Bruno Bogaz Zarpelão |
Forecasting Malware Incident Rates in Higher Education Institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (4) ![In: Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 4, pp. 226-237, 2024, Springer, 978-3-031-57915-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao |
Processing-in-Memory Architecture with Precision-Scaling for Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSID ![In: 37th International Conference on VLSI Design and 23rd International Conference on Embedded Systems, VLSID 2024, Kolkata, India, January 6-10, 2024, pp. 529-534, 2024, IEEE, 979-8-3503-8440-6. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Quang Duy Tran, Jaehyun Lim, Fabio Di Troia |
An Advanced Malware Detection System Based on NLP to Generate Genetic Markers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE ![In: IEEE International Conference on Consumer Electronics, ICCE 2024, Las Vegas, NV, USA, January 6-8, 2024, pp. 1-6, 2024, IEEE, 979-8-3503-2413-6. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Mohammad Mahmudul Alam, Edward Raff, Stella Biderman, Tim Oates 0001, James Holt |
Holographic Global Convolutional Networks for Long-Range Prediction Tasks in Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISTATS ![In: International Conference on Artificial Intelligence and Statistics, 2-4 May 2024, Palau de Congressos, Valencia, Spain., pp. 4042-4050, 2024, PMLR. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
9 | Raja Khurram Shahzad |
Automated Malware Detection and Classification Using Supervised Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2024 |
RDF |
|
9 | Evan Downing |
Improving the Understanding of Malware using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2024 |
RDF |
|
9 | Vineeth S. Varma, Yezekayel Hayel, Irinel-Constantin Morarescu |
A Non-Cooperative Resource Utilization Game Between Two Competing Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Control. Syst. Lett. ![In: IEEE Control. Syst. Lett. 7, pp. 67-72, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Euijin Choo, Mohamed Nabeel, Doowon Kim, Ravindu De Silva, Ting Yu 0001, Issa Khalil |
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Meas. Anal. Comput. Syst. ![In: Proc. ACM Meas. Anal. Comput. Syst. 7(3), pp. 59:1-59:26, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Durmus Özkan Sahin, Oguz Emre Kural, Sedat Akleylek, Erdal Kiliç |
A novel permission-based Android malware detection system using feature selection based on linear regression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 35(7), pp. 4903-4918, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Dazhi Zhan, Yue Hu, Weili Li, Jun Chen, Shize Guo, Zhisong Pan |
Towards robust CNN-based malware classifiers using adversarial examples generated based on two saliency similarities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 35(23), pp. 17129-17146, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Maham Chaudhary, Ammar Masood |
RealMalSol: real-time optimized model for Android malware detection using efficient neural networks and model quantization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 35(15), pp. 11373-11388, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani |
Maaker: A framework for detecting and defeating evasion techniques in Android malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 78, pp. 103617, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Farnood Faghihi, Mohammad Zulkernine, Steven H. H. Ding |
AIM: An Android Interpretable Malware detector based on application class modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 75, pp. 103486, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Jiaqi Chen, Chong Yuan, Jiashuo Li, Donghai Tian, Rui Ma 0004, Xiaoqi Jia |
ELAMD: An ensemble learning framework for adversarial malware defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 75, pp. 103508, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Lalit Kumar Vashishtha, Kakali Chatterjee, Siddhartha Suman Rout |
An Ensemble approach for advance malware memory analysis using Image classification techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 77, pp. 103561, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Rajasekhar Chaganti, Vinayakumar Ravi, Tuan D. Pham |
A multi-view feature fusion approach for effective malware classification using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 72, pp. 103402, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Mohammadhadi Alaeiyan, Saeed Parsa, Vinod P. 0001 |
Sober: Explores for invasive behaviour of malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 74, pp. 103451, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Lu Huang, Jingfeng Xue, Yong Wang 0010, Zhenyan Liu, Junbao Chen, Zixiao Kong |
WHGDroid: Effective android malware detection based on weighted heterogeneous graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 77, pp. 103556, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Prachi, Namita Dabas, Prabha Sharma |
MalAnalyser: An effective and efficient Windows malware detection method based on API call sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 230, pp. 120756, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Hui-juan Zhu, Yang Li, Liang-min Wang, Victor S. Sheng |
A multi-model ensemble learning framework for imbalanced android malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 234, pp. 120952, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Ilker Kara |
Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 214, pp. 119133, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Ritwik Murali, T. Palanisamy, C. Shunmuga Velayutham |
Evolving malware variants as antigens for antivirus systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 226, pp. 120092, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Huijuan Zhu, Huahui Wei, Liangmin Wang 0001, Zhi-cheng Xu, Victor S. Sheng |
An effective end-to-end android malware detection method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 218, pp. 119593, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Huijuan Zhu, Wei Gu, Liangmin Wang 0001, Zhi-cheng Xu, Victor S. Sheng |
Android malware detection based on multi-head squeeze-and-excitation residual network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 212, pp. 118705, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Fabrício Ceschin, Marcus Botacin, Heitor Murilo Gomes, Felipe Azevedo Pinage, Luiz S. Oliveira, André Grégio |
Fast & Furious: On the modelling of malware detection as an evolving data stream. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 212, pp. 118590, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Tal Tsafrir, Aviad Cohen 0002, Etay Nir, Nir Nissim |
Efficient feature extraction methodologies for unknown MP4-Malware detection using Machine learning algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 219, pp. 119615, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Hamad Naeem, Shi Dong, Olorunjube James Falana, Farhan Ullah |
Development of a deep stacked ensemble with process based volatile memory forensics for platform independent malware detection and classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 223, pp. 119952, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | David Escudero García, Noemí DeCastro-García, Ángel Luis Muñoz Castañeda |
An effectiveness analysis of transfer learning for the concept drift problem in malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 212, pp. 118724, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Akram Zine Eddine Boukhamla, Abhishek Verma |
HyDroid: android malware detection using network flow combined with permissions and intent filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Mob. Commun. ![In: Int. J. Mob. Commun. 22(1), pp. 70-91, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Hemant Rathore, Adarsh Nandanwar, Sanjay K. Sahay, Mohit Sewak |
Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Forensic Sci. Int. Digit. Investig. ![In: Forensic Sci. Int. Digit. Investig. 44(Supplement), pp. 301511, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Yafei Wu, Jian Shi, Peicheng Wang, Dongrui Zeng, Cong Sun 0001 |
DeepCatra: Learning flow- and graph-based behaviours for Android malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 17(1), pp. 118-130, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Mohammed Nasser Al-Andoli, Shing Chiang Tan, Kok-Swee Sim, Pey Yun Goh, Chee Peng Lim |
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 44(6), pp. 10477-10493, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Ahsan Wajahat, Jingsha He, Nafei Zhu, Tariq Mahmood 0001, Ahsan Nazir, Muhammad Salman Pathan, Sirajuddin Qureshi, Faheem Ullah |
An adaptive semi-supervised deep learning-based framework for the detection of Android malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 45(3), pp. 5141-5157, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Cho Do Xuan, Hoa Dinh Nguyen |
Using knowledge graphs and contrastive learning for detecting APT Malware on Endpoint systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 45(3), pp. 4517-4533, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | S. Jebin Bose, R. Kalaiselvi |
An optimal deep learning-based framework for the detection and classification of android malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 44(6), pp. 9297-9310, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Nur Khairani Kamarudin, Ahmad Firdaus, Azlee Zabidi, Ferda Ernawan, Syifak Izhar Hisham, Mohd Faizal Ab Razak |
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 44(4), pp. 5601-5615, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | S. Jebin Bose, R. Kalaiselvi |
An optimal detection of android malware using dynamic attention-based LSTM classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 44(1), pp. 1425-1438, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Feng Pi, Shengwei Tian, Xinjun Pei, Peng Chen, Xin Wang, Xiaowei Wang |
AdaTrans: An adaptive transformer for IoT Malware detection based on sensitive API call graph and inter-component communication analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 45(6), pp. 11439-11452, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Chandra Shekhar Yadav, Sangeeta Gupta |
A Review on Malware Analysis for IoT and Android System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(2), pp. 118, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Shashank Awasthi, Pramod Kumar Srivastava, Naresh Kumar, Rudra Pratap Ojha, Ashok Kumar Yadav |
A Study of the Dissemination of Malware and the Enhancement of the Lifespan of Rechargeable Wireless Sensor Networks: An Epidemiological Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(6), pp. 851, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Ruqayah N. Ahmed, Amir Javed, Wafi Bedewi |
Is COVID-19 Being Used to Spread Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(4), pp. 398, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | M. Anusha, M. Karthika |
A Comprehensive Analysis on Various Deep Learning Techniques for Malware Detection in Android Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(5), pp. 593, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Amit Kumar Singh, Swapnesh Taterh, Uddalak Mitra |
An Efficient Tactic for Analysis and Evaluation of Malware Dump File Using the Volatility Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(5), pp. 457, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Santosh Jhansi K., Sujata Chakravarty, P. Ravi Kiran Varma |
A Two-Tier Fuzzy Meta-Heuristic Hybrid Optimization for Dynamic Android Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(2), pp. 117, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Ruqayah N. Ahmed, Amir Javed, Wafi Bedewi |
Correction: Is COVID-19 Being Used to Spread Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(5), pp. 475, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Animesh Kumar Jha, Abhishek Vaish, Sairaj Patil |
A Novel Framework for Metamorphic Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(1), pp. 10, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Sonam Bhardwaj, Mayank Dave |
Integrating a Rule-Based Approach to Malware Detection with an LSTM-Based Feature Selection Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(6), pp. 737, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Hadeel Alrubayyi, Gokop Goteng, Mona Jaber |
AIS for Malware Detection in a Realistic IoT System: Challenges and Opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Network ![In: Network 3(4), pp. 522-537, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Leopoldo Alexandre F. Mauricio, Marcelo G. Rubinstein |
A Network Function Virtualization Architecture for Automatic and Efficient Detection and Mitigation against Web Application Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Appl. ![In: J. Internet Serv. Appl. 14(1), pp. 10-20, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Siti Husna Abdul Rahman, Chastan Nevin Gabriel, Su-Cheng Haw, Ahmad Anwar Zainuddin |
Blockchain Malware Detection Tool Based on Signature Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Artif. Intell. Mach. Learn. ![In: Adv. Artif. Intell. Mach. Learn. 3(4), pp. 1654-1670, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Prithviraj Singh Bisht, Preeti Mishra, Pushpanjali Chauhan, R. C. Joshi 0001 |
HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Grid Util. Comput. ![In: Int. J. Grid Util. Comput. 14(4), pp. 356-367, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Miguel Azorín Castillo, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller |
Intelligent and behavioral-based detection of malware in IoT spectrum sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 22(3), pp. 541-561, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Runzheng Wang, Jian Gao, Shuhua Huang |
AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 22(5), pp. 1423-1443, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, V. K. Saraswat |
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 22(1), pp. 119-135, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Mo'ath Zyout, Raed Shatnawi, Hassan Najadat |
Malware classification approaches utilizing binary and text encoding of permissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 22(6), pp. 1687-1712, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Mar Gimenez-Aguilar, José María de Fuentes, Lorena González-Manzano |
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 22(5), pp. 1445-1480, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Sibo Shi, Shengwei Tian, Bo Wang, Tiejun Zhou, Guanxin Chen |
SFCGDroid: android malware detection based on sensitive function call graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 22(5), pp. 1115-1124, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Saurabh Pandey, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla |
Evading malware classifiers using RL agent with action-mask. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 22(6), pp. 1743-1763, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Adeilson Antonio da Silva, Maurício Pamplona Segundo |
On Deceiving Malware Classification with Section Injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Learn. Knowl. Extr. ![In: Mach. Learn. Knowl. Extr. 5(1), pp. 144-168, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Horacio Rodriguez-Bazan, Grigori Sidorov, Ponciano Jorge Escamilla-Ambrosio |
Android Malware Classification Based on Fuzzy Hashing Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Learn. Knowl. Extr. ![In: Mach. Learn. Knowl. Extr. 5(4), pp. 1826-1847, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Longhui Shu, Shi Dong 0001, Huadong Su, Junjie Huang |
Android Malware Detection Methods Based on Convolutional Neural Network: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Emerg. Top. Comput. Intell. ![In: IEEE Trans. Emerg. Top. Comput. Intell. 7(5), pp. 1330-1350, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters, Seyit Camtepe |
Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 15(6), pp. 214, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Adam Lockett, Ioannis Chalkias, Cagatay Yucel, Jane Henriksen-Bulmer, Vasilis Katos |
Investigating IPTV Malware in the Wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 15(10), pp. 325, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Savino Dambra, Leyla Bilge, Davide Balzarotti |
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 26(2), pp. 16:1-16:30, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Md Sajidul Islam Sajid, Jinpeng Wei, Ehab Al-Shaer, Qi Duan, Basel Abdeen, Latifur Khan |
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 26(4), pp. 51:1-51:36, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Maksim Ekin Eren, Manish Bhattarai, Robert J. Joyce, Edward Raff, Charles Nicholas, Boian S. Alexandrov |
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 26(4), pp. 48:1-48:27, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | B. V. Subba Rao, Vivek Sharma, Neeraj Rathore, Devendra Prasad, Harishchander Anandaram, Gaurav Soni |
A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cloud Appl. Comput. ![In: Int. J. Cloud Appl. Comput. 13(1), pp. 1-22, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Mangayarkarasi Ramaiah, Vanmathi Chandrasekaran, Vinayakumar Ravi |
A robust malware traffic classifier to combat security breaches in industry 4.0 applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 35(23), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Sathiyandrakumar Srinivasan, P. Deepalakshmi |
An innovative malware detection methodology employing the amalgamation of stacked BiLSTM and CNN+LSTM-based classification networks with the assistance of Mayfly metaheuristic optimization algorithm in cyber-attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 35(10), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Syed Khurram Jah Rizvi, Muhammad Moazam Fraz |
Robust malware clustering of windows portable executables using ensemble latent representation and distribution modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 35(8), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Xuanxia Yao, Yang Li 0174, Zhiguo Shi, Kaijun Liu, Xiaojiang Du |
Android malware detection based on sensitive features combination. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 35(6), pp. 1, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Çigdem Avci Salma, Bedir Tekinerdogan, Cagatay Catal |
Analyzing the performance of long short-term memory architectures for malware detection models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 35(6), pp. 1, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Xuping Huang, Shunsuke Mochizuki, Akira Fujita, Katsunari Yoshioka |
Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 31, pp. 165-173, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Hayyan Hasan, Hasan Deeb, Behrouz Tork Ladani |
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC Int. J. Inf. Secur. ![In: ISC Int. J. Inf. Secur. 15(1), pp. 59-71, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Lwin Khin Shar, Biniam Fisseha Demissie, Mariano Ceccato, Yan Naing Tun, David Lo 0001, Lingxiao Jiang, Christoph Bienert |
Experimental comparison of features, analyses, and classifiers for Android malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 28(6), pp. 130, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Nadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein |
Assessing the opportunity of combining state-of-the-art Android malware detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 28(1), pp. 22, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Priyanka Singh, Samir Kumar Borgohain, Achintya Kumar Sarkar, Jayendra Kumar, Lakhan Dev Sharma |
Feed-Forward Deep Neural Network (FFDNN)-Based Deep Features for Static Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Syst. ![In: Int. J. Intell. Syst. 2023, pp. 1-20, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Elliot Mbunge, Benhildah Muchemwa, John Batani, Nobuhle Mbuyisa |
A review of deep learning models to detect malware in Android applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Secur. Appl. ![In: Cyber Secur. Appl. 1, pp. 100014, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | E. Praveen Kumar, S. Priyanka |
A comprehensive survey on hardware-assisted malware analysis and primitive techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 235, pp. 109967, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Jian Liu 0008, Qingsai Xiao, Liling Xin, Qiuyun Wang, Yepeng Yao, Zhengwei Jiang |
M3F: A novel multi-session and multi-protocol based malware traffic fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 227, pp. 109723, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
|
|