Gravity Falls: A Comparative Analysis of Domain-Generation Algorithm (DGA) Detection Methods for Mobile Device Spearphishing Authors: Adam Dorian Wong, John D. Hastings | Published: 2026-03-03 フィッシング検出手法Malware Detection 2026.03.03 2026.03.04 Literature Database
SafePickle: Robust and Generic ML Detection of Malicious Pickle-based ML Models Authors: Hillel Ohayon, Daniel Gilkarov, Ran Dubin | Published: 2026-02-23 Malware DetectionMalware Detection MethodModel Extraction Attack 2026.02.23 2026.02.25 Literature Database
A Comparison of Adversarial Learning Techniques for Malware Detection Authors: Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp | Published: 2023-08-19 Malware DetectionAdversarial ExampleAdversarial attack 2023.08.19 2025.05.28 Literature Database
Cryptographic ransomware encryption detection: Survey Authors: Kenan Begovic, Abdulaziz Al-Ali, Qutaibah Malluhi | Published: 2023-06-21 API Monitoring MethodMalware DetectionCryptography 2023.06.21 2025.05.28 Literature Database
On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities Authors: Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone, Huang Shengqiang | Published: 2023-06-12 Role of MLSecOpsCybersecurityMalware Detection 2023.06.12 2025.05.28 Literature Database
MalIoT: Scalable and Real-time Malware Traffic Detection for IoT Networks Authors: Ethan Weitkamp, Yusuke Satani, Adam Omundsen, Jingwen Wang, Peilong Li | Published: 2023-04-02 LSTM Model Performance EvaluationMalware DetectionMachine Learning Method 2023.04.02 2025.05.28 Literature Database
Automated Machine Learning for Deep Learning based Malware Detection Authors: Austin Brown, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-03-03 | Updated: 2023-11-03 Hyperparameter TuningMalware DetectionModel Performance Evaluation 2023.03.03 2025.05.28 Literature Database
Design of secure and robust cognitive system for malware detection Authors: Sanket Shukla | Published: 2022-08-03 Malware DetectionRobustnessAdversarial Example 2022.08.03 2025.05.28 Literature Database
Cybersecurity: Past, Present and Future Authors: Shahid Alam | Published: 2022-07-04 | Updated: 2024-03-03 Storage DeviceDigital ForensicsMalware Detection 2022.07.04 2025.05.28 Literature Database
Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification Authors: Daniel Gibert, Carles Mateu, Jordi Planes, Quan Le | Published: 2022-06-12 Malware DetectionAdversarial ExampleDeep Learning Method 2022.06.12 2025.05.28 Literature Database