Showing 41 - 60 results of 139 for search 'Malwa*', query time: 0.07s Refine Results
  1. 41

    Modeling and Analysis of the Spread of Malware with the Influence of User Awareness by Qingyi Zhu, Xuhang Luo, Yuhang Liu

    Published 2021-01-01
    “…By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. …”
    Get full text
    Article
  2. 42
  3. 43
  4. 44
  5. 45

    Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning by Jiankun Sun, Xiong Luo, Weiping Wang, Yang Gao, Wenbing Zhao

    Published 2023-08-01
    “…Therefore, learning from noisy labels is significant for machine learning‐enabled Malware identification. In this study, motivated by the symmetric cross entropy with satisfactory noise robustness, the authors propose a robust Malware identification method using temporal convolutional network (TCN). …”
    Get full text
    Article
  6. 46
  7. 47
  8. 48

    HD-SEIRS Malware Propagation Model in Heterogeneous Complex Networks by Elham Asadi, Soodeh Hosseini

    Published 2024-12-01
    Subjects: “…malware propagation modeling…”
    Get full text
    Article
  9. 49
  10. 50

    Graph representation federated learning for malware detection in Internet of health things by Mohamed Amjath, Shagufta Henna, Upaka Rathnayake

    Published 2025-03-01
    “…However, the increasing prevalence of malware threats presents significant security and privacy challenges. …”
    Get full text
    Article
  11. 51

    Multi-granularity Android malware fast detection based on opcode by Xuetao ZHANG, Meng SUN, Jinshuang WANG

    Published 2019-12-01
    “…The detection method based on opcode is widely used in Android malware detection,but it still contains some problems such as complex feature extraction method and low efficiency.In order to solve these problems,a multi-granularity fast detection method based on opcode for Android malware was proposed.Multi-granularity refers to the feature based on the bag of words model,and with the function as basic unit to extract features.By step-by-level aggregation feature,the APK multi-level information is obtained.The log length characterizes the scale of the function.And feature can be compressed and mapped to improve the efficiency and construct the corresponding classification model based on the semantic similarity of the Dalvik instruction set.Tests show that the proposed method has obvious advantages in performance and efficiency.…”
    Get full text
    Article
  12. 52
  13. 53

    Applying fractional calculus to malware spread: A fractal-based approach to threat analysis. by Nausheen Razi, Muhammad Bilal Riaz, Ambreen Bano, Tayyab Kamran, Umar Ishtiaq, Anum Shafiq

    Published 2025-01-01
    “…Software varies due to types of malware and is developed on structure of malware with a deep insight on behavior of nodes. …”
    Get full text
    Article
  14. 54
  15. 55
  16. 56

    Analysis and defense of the BlackEnergy malware in the Ukrainian electric power system by Yong WANG, Yu-ming WANG, Lin ZHANG, Lin-peng ZHANG

    Published 2017-01-01
    “…Ukrainian electric power system suffered BlackEnergy virus attacks in December 2015, resulting in blackout accident occurred simultaneously at multiple areas in Ivano-Frankovsk region, the malware also pose a threat to the electric power system security in China. …”
    Get full text
    Article
  17. 57

    A Malware Detection Scheme Based on Mining Format Information by Jinrong Bai, Junfeng Wang, Guozhong Zou

    Published 2014-01-01
    “…Malware has become one of the most serious threats to computer information system and the current malware detection technology still has very significant limitations. …”
    Get full text
    Article
  18. 58

    Bifurcation of a Fractional-Order Delayed Malware Propagation Model in Social Networks by Changjin Xu, Maoxin Liao, Peiluan Li

    Published 2019-01-01
    “…Thus, the study on malware propagation model plays an important role in network security. …”
    Get full text
    Article
  19. 59
  20. 60