RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13 Security AssuranceSoftware SecurityEvaluation Method 2022.12.07 2025.05.28 Literature Database
Multi-feature Dataset for Windows PE Malware Classification Authors: Muhammad Irfan Yousuf, Izza Anwer, Tanzeela Shakir, Minahil Siddiqui, Maysoon Shahid | Published: 2022-10-28 Software SecurityChallenges of Data LabelingClassification of Malicious Actors 2022.10.28 2025.05.28 Literature Database
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29 Cyber ThreatSoftware SecurityVulnerability Management 2022.06.29 2025.05.28 Literature Database
GANG-MAM: GAN based enGine for Modifying Android Malware Authors: Renjith G, Sonia Laudanna, Aji S, Corrado Aaron Visaggio, Vinod P | Published: 2021-09-27 Software SecurityMalware Detection MethodAdversarial attack 2021.09.27 2025.05.28 Literature Database
POSSE: Patterns of Systems During Software Encryption Authors: David Noever, Samantha Miller Noever | Published: 2021-09-24 Software SecurityPerformance EvaluationMachine Learning Application 2021.09.24 2025.05.28 Literature Database
Comment on “AndrODet: An adaptive Android obfuscation detector” Authors: Alireza Mohammadinodooshan, Ulf Kargén, Nahid Shahmehri | Published: 2019-10-14 | Updated: 2020-01-18 Software SecurityExperimental ValidationMachine Learning Algorithm 2019.10.14 2025.05.28 Literature Database