-
41
Modeling and Analysis of the Spread of Malware with the Influence of User Awareness
Published 2021-01-01“…By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. …”
Get full text
Article -
42
-
43
Malware classification method based on static multiple-feature fusion
Published 2017-11-01Subjects: “…malware…”
Get full text
Article -
44
Applying fractional calculus to malware spread: A fractal-based approach to threat analysis
Published 2025-01-01Get full text
Article -
45
Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning
Published 2023-08-01“…Therefore, learning from noisy labels is significant for machine learning‐enabled Malware identification. In this study, motivated by the symmetric cross entropy with satisfactory noise robustness, the authors propose a robust Malware identification method using temporal convolutional network (TCN). …”
Get full text
Article -
46
Incremental clustering method based on Gaussian mixture model to identify malware family
Published 2019-06-01Subjects: “…malware family…”
Get full text
Article -
47
Review of malware detection and classification visualization techniques
Published 2023-10-01Subjects: Get full text
Article -
48
HD-SEIRS Malware Propagation Model in Heterogeneous Complex Networks
Published 2024-12-01Subjects: “…malware propagation modeling…”
Get full text
Article -
49
A Dynamically Reconfigured Multi-FPGA Network Platform for High-Speed Malware Collection
Published 2012-01-01Get full text
Article -
50
Graph representation federated learning for malware detection in Internet of health things
Published 2025-03-01“…However, the increasing prevalence of malware threats presents significant security and privacy challenges. …”
Get full text
Article -
51
Multi-granularity Android malware fast detection based on opcode
Published 2019-12-01“…The detection method based on opcode is widely used in Android malware detection,but it still contains some problems such as complex feature extraction method and low efficiency.In order to solve these problems,a multi-granularity fast detection method based on opcode for Android malware was proposed.Multi-granularity refers to the feature based on the bag of words model,and with the function as basic unit to extract features.By step-by-level aggregation feature,the APK multi-level information is obtained.The log length characterizes the scale of the function.And feature can be compressed and mapped to improve the efficiency and construct the corresponding classification model based on the semantic similarity of the Dalvik instruction set.Tests show that the proposed method has obvious advantages in performance and efficiency.…”
Get full text
Article -
52
A Survey on Adversarial Attacks for Malware Analysis
Published 2025-01-01Subjects: Get full text
Article -
53
Applying fractional calculus to malware spread: A fractal-based approach to threat analysis.
Published 2025-01-01“…Software varies due to types of malware and is developed on structure of malware with a deep insight on behavior of nodes. …”
Get full text
Article -
54
Game theory-based malware propagation model for wireless sensor network
Published 2018-11-01Subjects: Get full text
Article -
55
The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks
Published 2025-01-01Subjects: Get full text
Article -
56
Analysis and defense of the BlackEnergy malware in the Ukrainian electric power system
Published 2017-01-01“…Ukrainian electric power system suffered BlackEnergy virus attacks in December 2015, resulting in blackout accident occurred simultaneously at multiple areas in Ivano-Frankovsk region, the malware also pose a threat to the electric power system security in China. …”
Get full text
Article -
57
A Malware Detection Scheme Based on Mining Format Information
Published 2014-01-01“…Malware has become one of the most serious threats to computer information system and the current malware detection technology still has very significant limitations. …”
Get full text
Article -
58
Bifurcation of a Fractional-Order Delayed Malware Propagation Model in Social Networks
Published 2019-01-01“…Thus, the study on malware propagation model plays an important role in network security. …”
Get full text
Article -
59
Android malware detection method based on permission sequential pattern mining algorithm
Published 2013-08-01Subjects: Get full text
Article -
60
IMCMK-CNN: A lightweight convolutional neural network with Multi-scale Kernels for Image-based Malware Classification
Published 2025-01-01Subjects: Get full text
Article