Showing 1 - 20 results of 139 for search 'Malwa*', query time: 0.09s Refine Results
  1. 1

    Malware recognition approach based on self‐similarity and an improved clustering algorithm by Jinfu Chen, Chi Zhang, Saihua Cai, Zufa Zhang, Lu Liu, Longxia Huang

    Published 2022-10-01
    “…Abstract The recognition of malware in network traffic is an important research problem. …”
    Get full text
    Article
  2. 2

    Influence of Removable Devices' Heterouse on the Propagation of Malware by Xie Han, Yi-Hong Li, Li-Ping Feng, Li-Peng Song

    Published 2013-01-01
    “…The effects of removable devices’ heterouse in different areas on the propagation of malware spreading via removable devices remain unclear. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Malware Analysis Using Visualized Image Matrices by KyoungSoo Han, BooJoong Kang, Eul Gyu Im

    Published 2014-01-01
    “…Our experimental results show that the image matrices of malware can effectively be used to classify malware families both statically and dynamically with accuracy of 0.9896 and 0.9732, respectively.…”
    Get full text
    Article
  6. 6

    Stochastic Stabilization of Malware Propagation in Wireless Sensor Network via Aperiodically Intermittent White Noise by Xiaojing Zhong, Baihao Peng, Feiqi Deng, Guiyun Liu

    Published 2020-01-01
    “…Our theoretical results can be applied to understand the observed mechanisms of malware and design interventions to control the spread of malware. …”
    Get full text
    Article
  7. 7
  8. 8

    Android malware detection method based on combined algorithm by Hao CHEN, Sihan QING

    Published 2016-10-01
    Subjects: “…malware detection…”
    Get full text
    Article
  9. 9
  10. 10

    Behavior Intention Derivation of Android Malware Using Ontology Inference by Jian Jiao, Qiyuan Liu, Xin Chen, Hongsheng Cao

    Published 2018-01-01
    “…Previous researches on Android malware mainly focus on malware detection, and malware’s evolution makes the process face certain hysteresis. …”
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    HTTP behavior characteristics generation and extraction approach for Android malware by Yaling LUO, Wenwei LI, Xin SU

    Published 2016-08-01
    “…Growing of Android malware,not only seriously endangered the security of the Android market,but also brings challenges for detection.A generation and extraction approach of automatic Android malware behavioral signatures was proposed based on HTTP traffic.Firstly,the behavioral signatures were extracted from the traffic traces generated by Android malware.Then,network behavioral characteristics were extracted from the generated network traffic.Finally,these behavioral signatures were used to detect Android malware.The experimental results show that the approach is able to extract Android malware network traffic behavioral signature with accuracy and efficiency.…”
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Android malware detection based on APK signature information feedback by Xin-yu LIU, Jian WENG, Yue ZHANG, Bing-wen FENG, Jia-si WENG

    Published 2017-05-01
    “…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20

    Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms by Seunghyun Park, Jin-Young Choi

    Published 2020-01-01
    “…In this study, we propose a machine learning-based data analysis method to accurately detect abnormal behaviors due to malware in large-scale network traffic in real time. …”
    Get full text
    Article