-
81
IMCMK-CNN: A lightweight convolutional neural network with Multi-scale Kernels for Image-based Malware Classification
Published 2025-01-01Subjects: Get full text
Article -
82
MalHAPGNN: An Enhanced Call Graph-Based Malware Detection Framework Using Hierarchical Attention Pooling Graph Neural Network
Published 2025-01-01Subjects: “…malware detection…”
Get full text
Article -
83
-
84
Research on Android security of broadcasting mechanism
Published 2016-10-01Subjects: Get full text
Article -
85
Successive memory image analysis method for malicious codes
Published 2017-02-01Subjects: “…malware…”
Get full text
Article -
86
Availability evaluation method for extended epidemic model and Markov chain based IoT
Published 2021-04-01Subjects: Get full text
Article -
87
DLCDroid an android apps analysis framework to analyse the dynamically loaded code
Published 2025-01-01Subjects: Get full text
Article -
88
Adversarial method for malicious ELF file detection based on deep reinforcement learning
Published 2024-10-01Subjects: Get full text
Article -
89
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers
Published 2024-06-01Subjects: “…malware…”
Get full text
Article -
90
Fast reused code tracing method based on simhash and inverted index
Published 2016-11-01Subjects: Get full text
Article -
91
Research on a Mobile Malicious Code Management and Control Method Based on Cloud-Pipeline-Terminal
Published 2013-08-01Subjects: Get full text
Article -
92
Attack signature generation by traceable dynamic taint analysis
Published 2012-05-01Subjects: “…malware…”
Get full text
Article -
93
Research status and outlook of Android security
Published 2016-10-01Subjects: Get full text
Article -
94
Mechanism and implementation of Rootkit attack and defense
Published 2018-12-01Subjects: Get full text
Article -
95
Research on malicious code variants detection based on texture fingerprint
Published 2014-08-01Subjects: Get full text
Article -
96
Using coverage analysis to extract Botnet command-and-control protocol
Published 2014-01-01Subjects: “…malware analysis…”
Get full text
Article -
97
Automatic generating regular expression signatures for real network worms
Published 2013-03-01Subjects: Get full text
Article -
98
Single password authentication method for remote user based on mobile terminal assistance
Published 2019-02-01Subjects: Get full text
Article -
99
Fuzzy reasoning model for analysis of program maliciousness
Published 2010-01-01Subjects: “…malware detection…”
Get full text
Article -
100
Deep visualization classification method for malicious code based on Ngram-TFIDF
Published 2024-06-01“…With the continuous increase in the scale and variety of malware, traditional malware analysis methods, which relied on manual feature extraction, become time-consuming and error-prone, rendering them unsuitable. …”
Get full text
Article