Figure 1 - uploaded by Felix Hill
Content may be subject to copyright.
3: An example of a node classification problem

3: An example of a node classification problem

Source publication
Thesis
Full-text available
Malware is a growing threat to modern computers, so that today, every system must protect itself with additional security software. This broad use of protection systems leads to a considerable number of malware samples which have to be analyzed on a daily basis and therefore, automated malware classification systems which can be used in practice ar...

Similar publications

Conference Paper
Full-text available
Application Programming Interfaces (APIs) are still considered the standard accessible data source and core wok of the most widely adopted malware detection and classification techniques. API-based malware detectors highly rely on measuring API’s statistical features, such as calculating the frequency counter of calling specific API calls or findin...
Article
Full-text available
The Internet of Things (IoT) is prone to malware assaults due to its simple installation and autonomous operating qualities. IoT devices have become the most tempting targets of malware due to well-known vulnerabilities such as weak, guessable, or hard-coded passwords, a lack of secure update procedures, and unsecured network connections. Tradition...
Chapter
Full-text available
Android malware detection is a significant problem that affects billions of users using millions of Android applications (apps) in existing markets. Thiss paper proposes PetaDroid, a framework for accurate Android malware detection and family clustering on top of static analyses. PetaDroid automatically adapts to Android malware and benign changes...
Article
Full-text available
Rapid digital infrastructure growth has advanced several sectors in today's interconnected society. Digital change increases vulnerabilities, especially in cybersecurity. Ransomware is a unique cyber danger because thieves' profit from it. Ransomware targets victims by encrypting their data and demanding money to decrypt it. Such attacks can cause...
Article
Full-text available
With the rapid increase in the number of Android malware, the image-based analysis method has become an effective way to defend against symmetric encryption and confusing malware. At present, the existing Android malware bytecode image detection method, based on a convolution neural network (CNN), relies on a single DEX file feature and requires a...