4.3 Article

A Novel Malware Classification Method Based on Crucial Behavior

Related references

Note: Only part of the references are listed.
Article Telecommunications

Android malware detection through generative adversarial networks

Muhammad Amin et al.

Summary: This article discusses the issue of malware on mobile devices and the Android platform, and introduces a deep learning-based malware detection technique. By using deep learning models and generative adversarial networks, this technique achieves high accuracy on a dataset of extracted opcodes.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2022)

Article Computer Science, Theory & Methods

Static malware detection and attribution in android byte-code through an end-to-end deep system

Muhammad Amin et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Theory & Methods

Malware detection in mobile environments based on Autoencoders and API-images

Gianni D'Angelo et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection

Tobias Wuchner et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Engineering, Multidisciplinary

Malware Detection Based on Deep Learning of Behavior Graphs

Fei Xiao et al.

MATHEMATICAL PROBLEMS IN ENGINEERING (2019)

Article Engineering, Multidisciplinary

Considering Quarantine in the SIRA Malware Propagation Model

Jose Roberto C. Piqueira et al.

MATHEMATICAL PROBLEMS IN ENGINEERING (2019)

Article Computer Science, Hardware & Architecture

Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient

Taejin Lee et al.

JOURNAL OF SUPERCOMPUTING (2018)

Article Computer Science, Information Systems

A malware detection method based on family behavior graph

Yuxin Ding et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Theory & Methods

Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis

Ming Fan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

A Secure Encryption-Based Malware Detection System

Zhaowen Lin et al.

KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS (2018)

Article Computer Science, Information Systems

Malytics: A Malware Detection Scheme

Mahmood Yousefi-Azar et al.

IEEE ACCESS (2018)

Article Computer Science, Theory & Methods

DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis

Ming Fan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

A graph-based model for malware detection and classification using system-call groups

Stavros D. Nikolopoulos et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2017)

Article Computer Science, Theory & Methods

Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware

Sanjeev Das et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

A framework for metamorphic malware analysis and real-time detection

Shahid Alam et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Information Systems

Approximate TF-IDF based on topic extraction from massive message stream using the GPU

Ugo Erra et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Information Systems

Enhancing the detection of metamorphic malware using call graphs

Ammar Ahmed E. Elhadi et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Information Systems

Deriving common malware behavior through graph clustering

Younghee Park et al.

COMPUTERS & SECURITY (2013)

Article Computer Science, Artificial Intelligence

The graph matching problem

Lorenzo Livi et al.

PATTERN ANALYSIS AND APPLICATIONS (2013)

Article Computer Science, Information Systems

Interpreting TF-IDF term weights as making relevance decisions

Ho Chung Wu et al.

ACM TRANSACTIONS ON INFORMATION SYSTEMS (2008)

Article Biotechnology & Applied Microbiology

What are decision trees?

Carl Kingsford et al.

NATURE BIOTECHNOLOGY (2008)

Article Chemistry, Multidisciplinary

Random forest: A classification and regression tool for compound classification and QSAR modeling

V Svetnik et al.

JOURNAL OF CHEMICAL INFORMATION AND COMPUTER SCIENCES (2003)