Search Results

There are 32300 results for: content related to: AutoMal: automatic clustering and signature generation for malwares based on the network flow

  1. Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 626–640, Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu and Yuan-Cheng Lai

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.764

  2. Anatomy of targeted attacks with smart malware

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 6215–6226, Şerif Bahtiyar

    Version of Record online : 3 FEB 2017, DOI: 10.1002/sec.1767

  3. Using HTML5 to prevent detection of drive-by-download web malware

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1237–1255, Alfredo De Santis, Giancarlo De Maio and Umberto Ferraro Petrillo

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1077

  4. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  5. A static Android malicious code detection method based on multi-source fusion

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3238–3246, Yao Du, Xiaoqing Wang and Junfeng Wang

    Version of Record online : 30 MAR 2015, DOI: 10.1002/sec.1248

  6. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)

    Security and Communication Networks

    Volume 9, Issue 5, 25 March 2016, Pages: 389–419, Peter Teufl, Michaela Ferk, Andreas Fitzek, Daniel Hein, Stefan Kraxberger and Clemens Orthacker

    Version of Record online : 18 JAN 2013, DOI: 10.1002/sec.675

  7. An effective behavior-based Android malware detection system

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2079–2089, Shihong Zou, Jing Zhang and Xiaodong Lin

    Version of Record online : 21 NOV 2014, DOI: 10.1002/sec.1155

  8. Three-phase behavior-based detection and classification of known and unknown malware

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2004–2015, Ying-Dar Lin, Yuan-Cheng Lai, Chun-Nan Lu, Peng-Kai Hsu and Chia-Yin Lee

    Version of Record online : 8 JAN 2015, DOI: 10.1002/sec.1148

  9. A dynamic malware analyzer against virtual machine aware malicious software

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2245–2257, Abdurrahman Pektaş and Tankut Acarman

    Version of Record online : 29 NOV 2013, DOI: 10.1002/sec.931

  10. Frequent sub-graph mining for intelligent malware detection

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1872–1886, Mojtaba Eskandari and Hooman Raesi

    Version of Record online : 10 JAN 2014, DOI: 10.1002/sec.902

  11. What you see predicts what you get—lightweight agent-based malware detection

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 33–48, Wei Wang, Ilona Murynets, Jeffrey Bickford, Christopher Van Wart and Gang Xu

    Version of Record online : 18 APR 2012, DOI: 10.1002/sec.528

  12. A static heuristic approach to detecting malware targets

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3015–3027, Mohaddeseh Zakeri, Fatemeh Faraji Daneshgar and Maghsoud Abbaspour

    Version of Record online : 8 APR 2015, DOI: 10.1002/sec.1228

  13. Smart malware detection on Android

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4254–4272, Laura Gheorghe, Bogdan Marin, Gary Gibson, Lucian Mogosanu, Razvan Deaconescu, Valentin-Gabriel Voiculescu and Mihai Carabas

    Version of Record online : 1 SEP 2015, DOI: 10.1002/sec.1340

  14. MalPEFinder: fast and retrospective assessment of data breaches in malware attacks

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 899–915, Shun-Te Liu and Yi-Ming Chen

    Version of Record online : 4 NOV 2011, DOI: 10.1002/sec.390

  15. Improving malware detection using multi-view ensemble learning

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4227–4241, Jinrong Bai and Junfeng Wang

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1600

  16. DLLMiner: structural mining for malware detection

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3311–3322, Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto, Hassan Takabi and Ashkan Sami

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1255

  17. Privacy theft malware multi-process collaboration analysis

    Security and Communication Networks

    Volume 8, Issue 1, 10 January 2015, Pages: 51–67, Lejun Fan, Yuanzhuo Wang, Xueqi Cheng, Jinming Li and Shuyuan Jin

    Version of Record online : 26 FEB 2013, DOI: 10.1002/sec.705

  18. DroidScreening: a practical framework for real-world Android malware analysis

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1435–1449, Junfeng Yu, Qingfeng Huang and CheeHoo Yian

    Version of Record online : 10 FEB 2016, DOI: 10.1002/sec.1430

  19. Design and implementation of a malware detection system based on network behavior

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 459–470, L. Xue and G. Sun

    Version of Record online : 9 JUN 2014, DOI: 10.1002/sec.993

  20. A collaborative approach on host and network level android malware detection

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5639–5650, Chanwoo Bae and Seungwon Shin

    Version of Record online : 22 FEB 2017, DOI: 10.1002/sec.1723