Online Malware Classification with System-Wide System Calls in Cloud IaaS Authors: Phillip Brown, Austin Brown, Maanak Gupta, Mahmoud Abdelsalam | Published: 2022-08-09 Malware ClassificationMalware Detection MethodMachine Learning Method 2022.08.09 2025.05.28 Literature Database
Robust Machine Learning for Malware Detection over Time Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Battista Biggio | Published: 2022-08-09 Malware Detection MethodRobustness EvaluationMachine Learning Method 2022.08.09 2025.05.28 Literature Database
DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic Authors: Zhi Liu | Published: 2022-08-08 Malware Detection MethodPerformance EvaluationCommunication Analysis 2022.08.08 2025.05.28 Literature Database
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration Authors: Gibran Gomez, Pedro Moreno-Sanchez, Juan Caballero | Published: 2022-06-01 | Updated: 2022-10-18 Malware Detection MethodTransaction Profit and PerformanceFunding 2022.06.01 2025.05.28 Literature Database
Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor Authors: Manabu Hirano, Ryotaro Kobayashi | Published: 2022-05-27 | Updated: 2022-08-18 Cyber ThreatData Management SystemMalware Detection Method 2022.05.27 2025.05.28 Literature Database
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs Authors: Euijin Choo, Mohamed Nabeel, Ravindu De Silva, Ting Yu, Issa Khalil | Published: 2022-05-26 Network Threat DetectionMalware Detection MethodMalicious URL Analysis 2022.05.26 2025.05.28 Literature Database
Towards a Fair Comparison and Realistic Evaluation Framework of Android Malware Detectors based on Static Analysis and Machine Learning Authors: Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, Jose Miguel-Alonso | Published: 2022-05-25 | Updated: 2022-10-06 Dataset evaluationMalware Detection MethodStatic Analysis 2022.05.25 2025.05.28 Literature Database
Using Static and Dynamic Malware features to perform Malware Ascription Authors: Jashanpreet Singh Sraw, Keshav Kumar | Published: 2021-12-05 Malware Detection MethodMachine Learning AlgorithmStatic Analysis 2021.12.05 2025.05.28 Literature Database
Node-wise Hardware Trojan Detection Based on Graph Learning Authors: Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa | Published: 2021-12-04 | Updated: 2022-03-16 Graph Representation LearningTopology AnalysisMalware Detection Method 2021.12.04 2025.05.28 Literature Database
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach Authors: James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen | Published: 2021-12-03 Prompt InjectionMalware Detection MethodAdversarial Attack Methods 2021.12.03 2025.05.28 Literature Database