Search Results

There are 17851 results for: content related to: Frequent sub-graph mining for intelligent malware detection

  1. Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 626–640, Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu and Yuan-Cheng Lai

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.764

  2. Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 947–965, Asaf shabtai, Dennis Potashnik, Yuval Fledel, Robert Moskovitch and Yuval Elovici

    Version of Record online : 26 JUL 2010, DOI: 10.1002/sec.229

  3. Anatomy of targeted attacks with smart malware

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 6215–6226, Şerif Bahtiyar

    Version of Record online : 3 FEB 2017, DOI: 10.1002/sec.1767

  4. A static heuristic approach to detecting malware targets

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3015–3027, Mohaddeseh Zakeri, Fatemeh Faraji Daneshgar and Maghsoud Abbaspour

    Version of Record online : 8 APR 2015, DOI: 10.1002/sec.1228

  5. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  6. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)

    Security and Communication Networks

    Volume 9, Issue 5, 25 March 2016, Pages: 389–419, Peter Teufl, Michaela Ferk, Andreas Fitzek, Daniel Hein, Stefan Kraxberger and Clemens Orthacker

    Version of Record online : 18 JAN 2013, DOI: 10.1002/sec.675

  7. Three-phase behavior-based detection and classification of known and unknown malware

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2004–2015, Ying-Dar Lin, Yuan-Cheng Lai, Chun-Nan Lu, Peng-Kai Hsu and Chia-Yin Lee

    Version of Record online : 8 JAN 2015, DOI: 10.1002/sec.1148

  8. A dynamic malware analyzer against virtual machine aware malicious software

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2245–2257, Abdurrahman Pektaş and Tankut Acarman

    Version of Record online : 29 NOV 2013, DOI: 10.1002/sec.931

  9. Metamorphic malware detection using base malware identification approach

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1719–1733, Devendra Kumar Mahawer and A. Nagaraju

    Version of Record online : 6 NOV 2013, DOI: 10.1002/sec.869

  10. Structural classification and similarity measurement of malware

    IEEJ Transactions on Electrical and Electronic Engineering

    Volume 9, Issue 6, November 2014, Pages: 621–632, Hongbo Shi, Tomoki Hamagami, Katsunari Yoshioka, Haoyuan Xu, Kazuhiro Tobe and Shigeki Goto

    Version of Record online : 27 SEP 2014, DOI: 10.1002/tee.22018

  11. Using HTML5 to prevent detection of drive-by-download web malware

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1237–1255, Alfredo De Santis, Giancarlo De Maio and Umberto Ferraro Petrillo

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1077

  12. MalPEFinder: fast and retrospective assessment of data breaches in malware attacks

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 899–915, Shun-Te Liu and Yi-Ming Chen

    Version of Record online : 4 NOV 2011, DOI: 10.1002/sec.390

  13. Improving malware detection using multi-view ensemble learning

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4227–4241, Jinrong Bai and Junfeng Wang

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1600

  14. DLLMiner: structural mining for malware detection

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3311–3322, Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto, Hassan Takabi and Ashkan Sami

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1255

  15. A static Android malicious code detection method based on multi-source fusion

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3238–3246, Yao Du, Xiaoqing Wang and Junfeng Wang

    Version of Record online : 30 MAR 2015, DOI: 10.1002/sec.1248

  16. Privacy theft malware multi-process collaboration analysis

    Security and Communication Networks

    Volume 8, Issue 1, 10 January 2015, Pages: 51–67, Lejun Fan, Yuanzhuo Wang, Xueqi Cheng, Jinming Li and Shuyuan Jin

    Version of Record online : 26 FEB 2013, DOI: 10.1002/sec.705

  17. DroidScreening: a practical framework for real-world Android malware analysis

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1435–1449, Junfeng Yu, Qingfeng Huang and CheeHoo Yian

    Version of Record online : 10 FEB 2016, DOI: 10.1002/sec.1430

  18. An effective behavior-based Android malware detection system

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2079–2089, Shihong Zou, Jing Zhang and Xiaodong Lin

    Version of Record online : 21 NOV 2014, DOI: 10.1002/sec.1155

  19. What you see predicts what you get—lightweight agent-based malware detection

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 33–48, Wei Wang, Ilona Murynets, Jeffrey Bickford, Christopher Van Wart and Gang Xu

    Version of Record online : 18 APR 2012, DOI: 10.1002/sec.528

  20. Holography: a behavior-based profiler for malware analysis

    Software: Practice and Experience

    Volume 42, Issue 9, September 2012, Pages: 1107–1136, Shih-Yao Dai, Yarochkin Fyodor, Ming-Wei Wu, Yennun Huang and Sy-Yen Kuo

    Version of Record online : 13 OCT 2011, DOI: 10.1002/spe.1115