Search Results - intelligence _ malware algorithm
Search alternatives:
- malware algorithm »
-
1
-
2
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024Subjects:Article -
3
-
4
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Subjects:Conference Paper -
5
MalDroid: Secure DL-enabled intelligent malware detection framework
Published 2021“…The authors present a secure by design efficient and intelligent Android detection framework against prevalent, sophisticated and persistent malware threats and attacks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…Hence, it is important to detect Android malware since it could expose a great threat to the users. …”
Get full text
Get full text
Get full text
Article -
7
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…To combat these threats, intelligent anti-malware systems utilizing machine learning (ML) models are useful. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Living in a cyber world, being infected by these malwares becoming more common. Nowadays the malwares attack especially by the trojan horse is becoming more sophisticated and intelligent, makes it is harder to be detected than before. …”
Proceedings Paper -
10
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…Mobile phones have become immensely popular as intelligent terminals worldwide. The open-source nature of mobile platforms has facilitated the development of third- party mobile applications, but it has also created an environment for mobile malware to thrive. …”
Get full text
Get full text
Thesis -
11
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
Published 2024“…Hence, this paper reports bibliometric analysis used to discover current and future trends and gain new insights into the relationship between deep learning and malware. This paper’s discoveries include: Deployment of deep learning to detect domain generation algorithm (DGA) attacks; Deployment of deep learning to detect malware in Internet of Things (IoT); The rise of adversarial learning and adversarial attack using deep learning; The emergence of Android malware in deep learning; The deployment of transfer learning in malware research; and active authors on deep learning and malware research, including Soman KP, Vinayakumar R, and Zhang Y.…”
Get full text
Get full text
Get full text
Article -
12
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023Get full text
Get full text
Undergraduates Project Papers -
13
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Published 2022“…Therefore, it is essential to detect cryptojacking malware, as it poses a significant risk to users. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
