Tarallo: Evading Behavioral Malware Detectors in the Problem Space Authors: Gabriele Digregorio, Salvatore Maccarrone, Mario D'Onghia, Luigi Gallo, Michele Carminati, Mario Polino, Stefano Zanero | Published: 2025-06-03 API SecurityDynamic Analysis MethodBehavior Analysis Method 2025.06.03 2025.06.05 Literature Database
CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection Authors: Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu | Published: 2023-07-18 Malware Detection MethodMachine Learning MethodBehavior Analysis Method 2023.07.18 2025.05.28 Literature Database
Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09 Attack MethodAdversarial TrainingBehavior Analysis Method 2023.06.09 2025.05.28 Literature Database
A Preliminary Study On the Sustainability of Android Malware Detection Authors: Haipeng Cai | Published: 2018-07-22 | Updated: 2018-08-03 Malware DetectionModel EvaluationBehavior Analysis Method 2018.07.22 2025.05.28 Literature Database
Emulating malware authors for proactive protection using GANs over a distributed image visualization of dynamic file behavior Authors: Vineeth S. Bhaskara, Debanjan Bhattacharyya | Published: 2018-07-19 | Updated: 2018-07-30 Malware ClassificationFeature Extraction MethodBehavior Analysis Method 2018.07.19 2025.05.28 Literature Database