SOTAVerified

Malware Detection

Malware Detection is a significant part of endpoint security including workstations, servers, cloud instances, and mobile devices. Malware Detection is used to detect and identify malicious activities caused by malware. With the increase in the variety of malware activities on CMS based websites such as malicious malware redirects on WordPress site (Aka, WordPress Malware Redirect Hack) where the site redirects to spam, being the most widespread, the need for automatic detection and classifier amplifies as well. The signature-based Malware Detection system is commonly used for existing malware that has a signature but it is not suitable for unknown malware or zero-day malware

Source: The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey

Papers

Showing 376400 of 431 papers

TitleStatusHype
A Novel Approach to Malicious Code Detection Using CNN-BiLSTM and Feature Fusion0
A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion0
A Novel Malware Detection Mechanism based on Features Extracted from Converted Malware Binary Images0
A Novel Reinforcement Learning Model for Post-Incident Malware Investigations0
A Novel Resampling Technique for Imbalanced Dataset Optimization0
apk2vec: Semi-supervised multi-view representation learning for profiling Android applications0
Applications of Positive Unlabeled (PU) and Negative Unlabeled (NU) Learning in Cybersecurity0
A Review of Computer Vision Methods in Network Security0
A Review on The Use of Deep Learning in Android Malware Detection0
Artificial Neural Network for Cybersecurity: A Comprehensive Review0
A short review on Applications of Deep learning for Cyber security0
Transferable Cost-Aware Security Policy Implementation for Malware Detection Using Deep Reinforcement Learning0
Assessing Cyclostationary Malware Detection via Feature Selection and Classification0
Assessing the Impact of Packing on Machine Learning-Based Malware Detection and Classification Systems0
Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS0
A Survey of Malware Detection Using Deep Learning0
A Survey on Cross-Architectural IoT Malware Threat Hunting0
A Survey on Malware Detection with Graph Representation Learning0
A survey on practical adversarial examples for malware classifiers0
A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes0
A Transformer-Based Framework for Payload Malware Detection and Classification0
ATWM: Defense against adversarial malware based on adversarial training0
A two-steps approach to improve the performance of Android malware detectors0
A Visualized Malware Detection Framework with CNN and Conditional GAN0
Behavioral Malware Classification using Convolutional Recurrent Neural Networks0
Show:102550
← PrevPage 16 of 18Next →

No leaderboard results yet.