Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
134 | Jusuk Lee, Kyoochang Jeong, Heejo Lee |
Detecting metamorphic malwares using code graphs. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
code graph, metamorphic malware, static analysis, code obfuscation |
112 | Yong-Joon Park, Zhao Zhang, Songqing Chen |
Run-Time Detection of Malwares via Dynamic Control-Flow Inspection. |
ASAP |
2009 |
DBLP DOI BibTeX RDF |
|
112 | Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda |
Design Issues of an Isolated Sandbox Used to Analyze Malwares. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
109 | Keehyung Kim, Byung Ro Moon |
Malware detection based on dependency graph using hybrid genetic algorithm. |
GECCO |
2010 |
DBLP DOI BibTeX RDF |
genetic algorithm, dependency graph, malware detection, subgraph isomorphism |
36 | Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao |
How to Locate a Target Binary Process and Its Derivatives in System Emulator. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
system emulator, virtualization, instrumentation, malwares, multiprocessing |
25 | Usman Ahmed, Jerry Chun-Wei Lin, Gautam Srivastava 0001, Alireza Jolfaei |
Active Learning Based Adversary Evasion Attacks Defense for Malwares in the Internet of Things. |
IEEE Syst. J. |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Benjamin Marais |
Améliorations des outils de détection de malwares par analyse statique grâce à des mécanismes d'intelligence artificielle. (Static analysis malware detection tools enhanced by artificial intelligence mechanisms). |
|
2023 |
RDF |
|
25 | Do Thi Thu Hien, The Duy Phan, Hao Le Anh, Lan Nguyen Duy, Nghi Hoang Khoa, Van-Hau Pham |
A Method of Mutating Windows Malwares using Reinforcement Learning with Functionality Preservation. |
SoICT |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Benjamin Vignau, Raphaël Khoury, Sylvain Hallé, Abdelwahab Hamou-Lhadj |
The evolution of IoT Malwares, from 2008 to 2019: Survey, taxonomy, process simulator and perspectives. |
J. Syst. Archit. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | N. Saranya, V. Manikandan |
On viability of detecting malwares online using ensemble classification method with performance metrics. |
Comput. Intell. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Ben Abdel Ouahab Ikram, Lotfi El Aachak, Boudhir Anouar Abdelhakim, Bouhorma Mohammed |
Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide. |
NISS |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Lin Chen, Huahui Lv, Kai Fan, Hang Yang, Xiaoyun Kuang, Aidong Xu, Siliang Suo |
An Ensemble Learning Approach to Detect Malwares Based on Static Information. |
ICA3PP (3) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Shin-Ming Cheng, Tao Ban, Jr-Wei Huang, Bing-Kai Hong, Daisuke Inoue |
ELF Analyzer Demo: Online Identification for IoT Malwares with Multiple Hardware Architectures. |
SP (Workshops) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Louison Gitzinger |
Surviving the massive proliferation of mobile malware. (Survivre à la prolifération massive des malwares sur mobile). |
|
2020 |
RDF |
|
25 | Abhishek Bhattacharya, Radha Tamal Goswami, Kuntal Mukherjee, Gia Nhu Nguyen |
An Ensemble Voted Feature Selection Technique for Predictive Modeling of Malwares of Android. |
Int. J. Inf. Syst. Model. Des. |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Easwaramoorthy Arul, Venugopal Manikandan |
Dynamic runtime protection technique against the file system injecting malwares. |
Int. J. Bus. Intell. Data Min. |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Abhishek Bhattacharya, Radha Tamal Goswami, Kuntal Mukherjee |
A feature selection technique based on rough set and improvised PSO algorithm (PSORS-FS) for permission based detection of Android malwares. |
Int. J. Mach. Learn. Cybern. |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Anand Tirkey, Ramesh Kumar Mohapatra, Lov Kumar |
Anatomizing Android Malwares. |
APSEC |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Gabriel Bastos, Artur Marzano, Elverton C. Fazzion, Osvaldo L. H. M. Fonseca, Ítalo Cunha, Cristine Hoepers, Klaus Steding-Jessen, Marcelo H. P. C. Chaves |
Identificação Automática de Servidores C&C e Identificação de Variantes de Malwares Bashlite e Mirai. |
SBRC |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Ben Abdel Ouahab Ikram, Bouhorma Mohammed, Boudhir Anouar Abdelhakim, Lotfi El Aachak, Bassam A. Zafar |
Machine learning application for malwares classification using visualization technique. |
SCA |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Soussi Ilham, Abderrahim Ghadi, Boudhir Anouar Abdelhakim |
Deep learning for detecting Android malwares. |
SCA |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Jiwon Hong, Sanghyun Park 0003, Sang-Wook Kim, Dongphil Kim, Wonho Kim |
Classifying malwares for identification of author groups. |
Concurr. Comput. Pract. Exp. |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Sidney Marlon Lopes de Lima, Heverton Kleidson de Lima Silva, João Henrique da Silva Luz, Samuel Lopes de Paula Silva, Hercília Juliana do Nascimento Lima, Anna Beatriz Augusta de Andrade, Alisson Marques da Silva |
Antivírus dotado de Rede Neural Artificial visando Detectar Malwares Preventivamente. |
Braz. J. Inf. Syst. |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Zahoor-Ur Rehman, Sidra Nasim Khan, Khan Muhammad 0001, Jong Weon Lee 0002, Zhihan Lv, Sung Wook Baik, Peer Azmat Shah, Khalid Mahmood Awan, Irfan Mehmood |
Machine learning-assisted signature and heuristic-based detection of malwares in Android devices. |
Comput. Electr. Eng. |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Danial Javaheri, Mehdi Hosseinzadeh 0001 |
A Framework for Recognition and Confronting of Obfuscated Malwares Based on Memory Dumping and Filter Drivers. |
Wirel. Pers. Commun. |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Yoshihiro Oyama |
Trends of anti-analysis operations of malwares observed in API call logs. |
J. Comput. Virol. Hacking Tech. |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Michele De Donno, Nicola Dragoni, Alberto Giaretta 0001, Angelo Spognardi |
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation. |
Secur. Commun. Networks |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Yu Liu 0004, Kai Guo, Xiangdong Huang, Zhou Zhou, Yichi Zhang |
Detecting Android Malwares with High-Efficient Hybrid Analyzing Methods. |
Mob. Inf. Syst. |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Suchul Lee, Sungho Kim, Sungil Lee, Jaehyuk Choi 0002, Hanjun Yoon, Dohoon Lee, Jun-Rak Lee |
LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation. |
IEEE Trans. Dependable Secur. Comput. |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Naoki Hashimoto, Seiichi Ozawa, Tao Ban, Junji Nakazato, Jumpei Shimamura |
A Darknet Traffic Analysis for IoT Malwares Using Association Rule Learning. |
INNS Conference on Big Data |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Syed Fakhar Bilal, Saba Bashir, Farhan Hassan Khan, Haroon Rasheed |
Malwares Detection for Android and Windows System by Using Machine Learning and Data Mining. |
INTAP |
2018 |
DBLP DOI BibTeX RDF |
|
25 | João M. Ceron, Cíntia B. Margi, Lisandro Z. Granville |
MARS: uma arquitetura para análise de malwares utilizando SDN. |
SBRC Companion |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Shay Nachum, Assaf Schuster, Opher Etzion |
Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels to Detect Malwares. |
CSCML |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Mourad Leslous |
Highlight and execute suspicious paths in Android malware. (Mettre en avant et exécuter les chemins suspicieux dans les malwares Android). |
|
2018 |
RDF |
|
25 | Ali Shuja Siddiqui, Chia-Che Lee, Fareena Saqib |
Hardware based protection against malwares by PUF based access control mechanism. |
MWSCAS |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Angelo Spognardi, Michele De Donno, Nicola Dragoni, Alberto Giaretta 0001 |
Analysis of DDoS-Capable IoT Malwares. |
FedCSIS |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Dong Shen, Xiaojing Su, Zhoujun Li 0001 |
HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM. |
CSS |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Sevil Sen, Ahmet Ilhan Aysan, John A. Clark |
SAFEDroid: Using Structural Features for Detecting Android Malwares. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Soussi Ilham, Abderrahim Ghadi |
Detection and Classification of Malwares in Mobile Applications. |
SCA |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Shahrooz Pooryousef, Kazim Fouladi |
Proposing a New Feature for Structure-Aware Analysis of Android Malwares. |
ISCISC |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Hiroaki Tanaka, Shingo Yamaguchi |
On modeling and simulation of the behavior of IoT malwares Mirai and Hajime. |
ISCE |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Xi Luo, Liming Wang, Zhen Xu 0009, Jing Yang, Mo Sun, Jing Wang |
DGASensor: Fast Detection for DGA-Based Malwares. |
ICCBN |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Fadi Mohsen, Halil Bisgin, Zachary Scott, Kyle Strait |
Detecting Android Malwares by Mining Statically Registered Broadcast Receivers. |
CIC |
2017 |
DBLP DOI BibTeX RDF |
|
25 | João Marcelo Ceron |
MARS: uma arquitetura para análise de malwares utilizando SDN. |
|
2017 |
RDF |
|
25 | Lingling Zeng, Min Lei, Wei Ren 0002, Shiqi Deng |
Optimizing Machine Learning based Large Scale Android Malwares Detection by Feature Disposal. |
3PGCIC |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Linhai Song, Heqing Huang, Wu Zhou, Wenfei Wu, Yiying Zhang 0005 |
Learning from Big Malwares. |
APSys |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Guillaume Bonfante, Julien Oury Nogues |
Function Classification for the Retro-Engineering of Malwares. |
FPS |
2016 |
DBLP DOI BibTeX RDF |
|
25 | K. P. Deepta, A. Salim |
Detecting Malwares Using Dynamic Call Graphs and Opcode Patterns. |
ICACDS |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Sun Hao, Wen Wang, Huabiao Lu, Peige Ren |
AutoMal: automatic clustering and signature generation for malwares based on the network flow. |
Secur. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Emre Aydogan, Sevil Sen |
Automatic Generation of Mobile Malwares Using Genetic Programming. |
EvoApplications |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Aurélien Thierry |
Désassemblage et détection de logiciels malveillants auto-modifiants. (Disassembly and detection of self-modifying malwares). |
|
2015 |
RDF |
|
25 | Ashu Sharma, Sanjay Kumar Sahay |
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
25 | Umer Asgher, Fahad Moazzam Dar, Ali Hamza, Abdul Moeed Paracha |
Analysis of Increasing Malwares and Cyber Crimes Using Economic Approach. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
25 | Ekta Gandotra, Divya Bansal, Sanjeev Sofat |
Integrated Framework for Classification of Malwares. |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Dan Li, Chaoge Liu, Xu Cui, Xiang Cui |
Sniffing and propagating malwares through WPAD deception in LANs. |
CCS |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Alan P. Sprague, Adam Rhodes, Gary Warner |
Using closed frequent sets to cluster malwares. |
ICAT |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Divyajyoti Das, Somesh Nanda |
Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares. |
WorldCIS |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Marwa M. A. Elfattah, Aliaa A. A. Youssif, Ebada Sarhan Ahmed |
Handset Malwares Threats Feature Extraction Based on Behavior Analysis. |
Comput. Inf. Sci. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Wenhua Luo, Na Li, Yanjun Tang |
Reverse Analysis of Malwares: A Case Study on QQ Passwords Collection. |
J. Softw. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Mojtaba Eskandari, Sattar Hashemi |
A graph mining approach for detecting unknown malwares. |
J. Vis. Lang. Comput. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Hajer Al Housani, Hadi Otrok, Rabeb Mizouni, Jean-Marc Robert 0001, Azzam Mourad |
Towards Smart Anti-Malwares for Battery-Powered Devices. |
NTMS |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Seyed Emad Armoun, Sattar Hashemi |
A General Paradigm for Normalizing Metamorphic Malwares. |
FIT |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Geoffroy Gueguen |
Van Wijngaarden grammars, metamorphism and K-ary malwares |
CoRR |
2010 |
DBLP BibTeX RDF |
|
25 | Hossein Rouhani Zeidanloo, Farzaneh Tabatabaei, Payam Vahdani Amoli, Atefeh Tajpour |
All About Malwares (Malicious Codes). |
Security and Management |
2010 |
DBLP BibTeX RDF |
|
25 | Michal Szczepanik, Ireneusz J. Jozwiak |
Detecting Malwares in Honeynet Using a Multi-agent System. |
NDT (2) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Michal Szczepanik, Ireneusz J. Józwiak |
Detecting New and Unknown Malwares Using Honeynet. |
MISSI |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda |
Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares. |
DETER |
2007 |
DBLP BibTeX RDF |
|
25 | Kazumasa Omote, Takeshi Shimoyama, Satoru Torii |
Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model. |
ICETE (Selected Papers) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Christian Scheel, Seyit Ahmet Çamtepe, Sahin Albayrak |
Monitoring Smartphones for Anomaly Detection. |
Mob. Networks Appl. |
2009 |
DBLP DOI BibTeX RDF |
monitoring, anomaly detection, smartphones |
22 | Wei Yan, Erik Wu |
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. |
Complex (1) |
2009 |
DBLP DOI BibTeX RDF |
network security, cloud computing, malware, anti-virus |
22 | Daisuke Inoue, Mio Suzuki, Masashi Eto, Katsunari Yoshioka, Koji Nakao |
DAEDALUS: Novel Application of Large-Scale Darknet Monitoring for Practical Protection of Live Networks. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
darknet monitoring, live network protection, alert system |
22 | Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao |
Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jun-Hyung Park, Minsoo Kim 0002, Bong-Nam Noh |
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Anti-Forensic, Machine language, Malicious executables, opcode visualization, Similarity, Malware, Digital Forensic |
22 | Muazzam Siddiqui, Morgan C. Wang, Joohan Lee |
Detecting Trojans Using Data Mining Techniques. |
IMTIC |
2008 |
DBLP DOI BibTeX RDF |
Trojan Detection, Data Mining, Support Vector Machines, Principal Component Analysis, Random Forest, Disassembly |
22 | Sébastien Josse |
Secure and advanced unpacking using computer emulation. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
Anti-virus testing, Human driven analysis, Fault injection, Forensics, Software protection, Malware analysis |
22 | Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu |
Hacking Tricks Toward Security on Network Environments. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing |