A survey on malware propagation, analysis, and detection
Lately, a new kind of war takes place between the security community and malicious software developers, the security specialists use all possible techniques, methods and strategies to stop and remove the threats while the malware developers utilize new types of malwares that bypass implemented secur...
| Main Authors: | Damshenas, Mohsen, Dehghantanha, Ali, Mahmod, Ramlan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
The Society of Digital Information and Wireless Communications
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30628/ http://psasir.upm.edu.my/id/eprint/30628/1/A%20survey%20on%20malware%20propagation.pdf |
Similar Items
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014)
by: Damshenas, Mohsen
Published: (2014)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024)
by: Kadhum, Laith M., et al.
Published: (2024)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
A survey on cyber-crime prediction techniques
by: Shaerpour, Kaveh, et al.
Published: (2013)
by: Shaerpour, Kaveh, et al.
Published: (2013)
Analysis of known and unknown malware bypassing techniques
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Preliminary analysis of malware detection in opcode sequences within IoT environment
by: Ahmed, Firas Shihab, et al.
Published: (2020)
by: Ahmed, Firas Shihab, et al.
Published: (2020)
SCARECROW: scalable malware reporting, detection and analysis
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
Review of hybrid analysis technique for malware detection
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
N/A and signature analysis for malwares detection and removal
by: Jawad, Ahmad Ridha, et al.
Published: (2019)
by: Jawad, Ahmad Ridha, et al.
Published: (2019)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
Permission extraction framework for android malware detection
by: Ghasempour, Ali
Published: (2019)
by: Ghasempour, Ali
Published: (2019)
A review : Static analysis of android malware and detection technique
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Challenges in high accuracy of malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Machine Learning Malware Detection For Android
by: Amir Muhammad Hafiz, Othman
Published: (2022)
by: Amir Muhammad Hafiz, Othman
Published: (2022)
A dynamic malware detection in cloud platform
by: Lee, Nani Yer Fui
Published: (2019)
by: Lee, Nani Yer Fui
Published: (2019)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Android malware detection using permission based static analysis
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2024)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2024)
Android malware detection using permission based static analysis
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2023)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
Malware Detection In Android Using Machine Learning
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
Bio-inspired for Features Optimization and Malware Detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
Nonnegative matrix factorization and metamorphic malware detection
by: Ling, Yeong Tyng, et al.
Published: (2019)
by: Ling, Yeong Tyng, et al.
Published: (2019)
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)
by: Mohammad Salehi, .
Published: (2019)
A Bayesian probability model for Android malware detection
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Comparative analysis and how efficient deep learning methods of malware detection
by: Mustapha, Norwati, et al.
Published: (2024)
by: Mustapha, Norwati, et al.
Published: (2024)
A static analysis approach for android permission-based malware detection systems
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
Ensemble based categorization and adaptive model for malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
Android mobile malware detection using Fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Evaluation of feature selection algorithm for android malware detection
by: Mazlan, Nurul Hidayah, et al.
Published: (2018)
by: Mazlan, Nurul Hidayah, et al.
Published: (2018)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
Deep learning based hybrid analysis of malware detection and classification: A recent review
by: Hussain, Syed Shuja, et al.
Published: (2023)
by: Hussain, Syed Shuja, et al.
Published: (2023)
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013)
by: Aminnezhad, Asou, et al.
Published: (2013)
Malware visualizer: A web apps malware family classification with machine learning
by: Mohd Zamri, Osman, et al.
Published: (2021)
by: Mohd Zamri, Osman, et al.
Published: (2021)
Similar Items
-
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014) -
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014) -
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011) -
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012) -
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024)