Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables Authors: Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli | Published: 2018-03-12 Malware Detection MethodAdversarial Attack DetectionEncryption Technology 2018.03.12 2025.05.28 Literature Database
Contaminant Removal for Android Malware Detection Systems Authors: Lichao Sun, Xiaokai Wei, Jiawei Zhang, Lifang He, Philip S. Yu, Witawas Srisa-an | Published: 2017-11-07 | Updated: 2017-11-14 Dataset GenerationMalware Detection MethodRandom Forest 2017.11.07 2025.05.28 Literature Database
Computer activity learning from system call time series Authors: Curt Hastings, Ronnie Mainieri | Published: 2017-11-06 Clustering methodsTrigger DetectionMalware Detection Method 2017.11.06 2025.05.28 Literature Database
Malware Detection by Eating a Whole EXE Authors: Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, Charles Nicholas | Published: 2017-10-25 Malware ClassificationMalware Detection MethodModel Design 2017.10.25 2025.05.28 Literature Database
Survey of Machine Learning Techniques for Malware Analysis Authors: Daniele Ucci, Leonardo Aniello, Roberto Baldoni | Published: 2017-10-23 | Updated: 2018-11-26 Malware Detection MethodDynamic AnalysisAnalysis of Detection Methods 2017.10.23 2025.05.28 Literature Database
Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection Authors: TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao | Published: 2017-10-15 Data Collection MethodMalware Detection MethodInformation Security 2017.10.15 2025.05.28 Literature Database
Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System Authors: Syed Ali Raza Shah, Biju Issac | Published: 2017-10-13 | Updated: 2017-11-07 Malware Detection MethodInformation SecurityAnomaly Detection Method 2017.10.13 2025.05.28 Literature Database
A Multi-view Context-aware Approach to Android Malware Detection and Malicious Code Localization Authors: Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu | Published: 2017-04-06 | Updated: 2017-04-08 Security Analysis MethodProgram AnalysisMalware Detection Method 2017.04.06 2025.05.28 Literature Database