SOTAVerified

Malware Detection

Malware Detection is a significant part of endpoint security including workstations, servers, cloud instances, and mobile devices. Malware Detection is used to detect and identify malicious activities caused by malware. With the increase in the variety of malware activities on CMS based websites such as malicious malware redirects on WordPress site (Aka, WordPress Malware Redirect Hack) where the site redirects to spam, being the most widespread, the need for automatic detection and classifier amplifies as well. The signature-based Malware Detection system is commonly used for existing malware that has a signature but it is not suitable for unknown malware or zero-day malware

Source: The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey

Papers

Showing 101150 of 431 papers

TitleStatusHype
Evaluating Explanation Methods for Deep Learning in SecurityCode0
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware DetectionCode0
Dynamic Malware Analysis with Feature Engineering and Feature LearningCode0
An Efficient Approach For Malware Detection Using PE Header SpecificationCode0
Evasion Attacks against Machine Learning at Test TimeCode0
How to 0wn the NAS in Your Spare TimeCode0
The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement LearningCode0
DeepSign: Deep Learning for Automatic Malware Signature Generation and ClassificationCode0
A Novel Approach to Malicious Code Detection Using CNN-BiLSTM and Feature Fusion0
A Non-Intrusive Machine Learning Solution for Malware Detection and Data Theft Classification in Smartphones0
AiDroid: When Heterogeneous Information Network Marries Deep Neural Network for Real-time Android Malware Detection0
An MDL-Based Classifier for Transactional Datasets with Application in Malware Detection0
An investigation of the classifiers to detect android malicious apps0
A Hierarchical Convolutional Neural Network for Malware Classification0
An investigation of a deep learning based malware detection system0
Counteracting Concept Drift by Learning with Future Malware Predictions0
A New Malware Detection System Using a High Performance-ELM method0
A New Formulation for Zeroth-Order Optimization of Adversarial EXEmples in Malware Detection0
Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection0
Context-aware, Adaptive and Scalable Android Malware Detection through Online Learning (extended version)0
A New Deep Boosted CNN and Ensemble Learning based IoT Malware Detection0
Data Augmentation for Opcode Sequence Based Malware Detection0
Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis0
Deceiving End-to-End Deep Learning Malware Detectors using Adversarial Examples0
Decentralised firewall for malware detection0
Decision-forest voting scheme for classification of rare classes in network intrusion detection0
Feature Extraction for Novelty Detection in Network Traffic0
Comprehensive Survey on Adversarial Examples in Cybersecurity: Impacts, Challenges, and Mitigation Strategies0
Comprehensive evaluation of Mal-API-2019 dataset by machine learning in malware detection0
A New Android Malware Detection Approach Using Bayesian Classification0
Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection0
Coda: An End-to-End Neural Program Decompiler0
A Neural-based Program Decompiler0
Clustering based opcode graph generation for malware variant detection0
Clipping Free Attacks Against Neural Networks0
An End-to-End Deep Learning Architecture for Classification of Malware’s Binary Content0
Clipping free attacks against artificial neural networks0
A Feature Set of Small Size for the PDF Malware Detection0
Adaptive and Scalable Android Malware Detection through Online Learning0
Classification under strategic adversary manipulation using pessimistic bilevel optimisation0
Certified Adversarial Robustness of Machine Learning-based Malware Detectors via (De)Randomized Smoothing0
Android Security using NLP Techniques: A Review0
Can't Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks0
Android Malware Detection with Unbiased Confidence Guarantees0
AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks0
Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach0
Can Feature Engineering Help Quantum Machine Learning for Malware Detection?0
Android Malware Detection Using Parallel Machine Learning Classifiers0
Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations0
Android Malware Detection Using Machine Learning on Image Patterns0
Show:102550
← PrevPage 3 of 9Next →

No leaderboard results yet.