Fast & Furious: Modelling Malware Detection as Evolving Data Streams Authors: Fabrício Ceschin, Marcus Botacin, Heitor Murilo Gomes, Felipe Pinagé, Luiz S. Oliveira, André Grégio | Published: 2022-05-24 | Updated: 2022-08-16 Data CollectionMalware DetectionConcept Drift 2022.05.24 2025.05.28 Literature Database
Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT Authors: Joseph Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis | Published: 2021-09-06 ML-Based IDSCyber ThreatMalware Detection 2021.09.06 2025.05.28 Literature Database
PDF-Malware: An Overview on Threats, Detection and Evasion Attacks Authors: Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani | Published: 2021-07-27 Overview of PDF FormatPoisoningMalware Detection 2021.07.27 2025.05.28 Literature Database
Deep Learning for Android Malware Defenses: a Systematic Literature Review Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2021-03-09 | Updated: 2022-08-09 Malware DetectionDeep Learning MethodDefense Method 2021.03.09 2025.05.28 Literature Database
Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers Authors: Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2020-10-30 Backdoor AttackMalware DetectionContent Specialized for Toxicity Attacks 2020.10.30 2025.05.28 Literature Database
Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors Authors: Edward Raff, Bobby Filar, James Holt | Published: 2020-10-22 Malware DetectionMachine Learning MethodWeight Update Method 2020.10.22 2025.05.28 Literature Database
MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers Authors: Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin | Published: 2020-03-06 | Updated: 2021-04-29 Malware ClassificationMalware DetectionAdversarial Perturbation Techniques 2020.03.06 2025.05.28 Literature Database
Detection and Analysis of Drive-by Downloads and Malicious Websites Authors: Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi | Published: 2020-02-19 | Updated: 2020-04-09 Malware DetectionInformation SecurityFeature Extraction Method 2020.02.19 2025.05.28 Literature Database
Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS Authors: Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal | Published: 2020-02-15 Training MethodMalware DetectionMachine Learning Algorithm 2020.02.15 2025.05.28 Literature Database
Feature-level Malware Obfuscation in Deep Learning Authors: Keith Dillon | Published: 2020-02-10 Malware ClassificationMalware Detection 2020.02.10 2025.05.28 Literature Database