Keywords: تشخیص بدافزار; Information security; Malware detection; Malware classification; Multinomial classification; Low-level features; Hardware activity;
مقالات ISI تشخیص بدافزار (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: تشخیص بدافزار; Android security; Malware detection; Intrusion detection; Classification; Ensemble learning; Static analysis;
Keywords: تشخیص بدافزار; Network traffic; Malicious apps; Imbalanced data; Malware detection; Machine learning;
Keywords: تشخیص بدافزار; Malware detection; Android; Security; Conformal Prediction; Class imbalance; Unbiased predictions; Confidence measures; Confidence guarantees; Random forests;
Keywords: تشخیص بدافزار; Malware detection; Intrusion detection; Recurrent neural networks; Machine learning; Deep learning;
Keywords: تشخیص بدافزار; Malware detection; Data-driven security analysis; File co-occurrence; Graph based semi-supervised learning; Content-agnostic;
Keywords: تشخیص بدافزار; Malware detection; Adversarial machine learning; Poisoning attacks; Manipulation; KuafuDet;
Keywords: تشخیص بدافزار; Sequential mining; Volatile memory; Memory dump; Virtual machine; Virtual server; Private cloud; Machine learning; Malware detection; Ransomware; Remote access Trojan;
Keywords: تشخیص بدافزار; Android; Malware detection; Pattern match; System call;
Keywords: تشخیص بدافزار; Memory analysis; Reverse engineering; Windows internals; Operating system; Forensic analysis; Malware detection; Intrusion detection;
Keywords: تشخیص بدافزار; Importance metric; Access behavior; Security dependency network; Malware detection; Behavioral-based detection;
Keywords: تشخیص بدافزار; Android security; Malware detection; Static detection; Threat degree;
Keywords: تشخیص بدافزار; Wavelet decomposition; Structural entropy; Malware detection; Parasitic malware; Machine learning;
Keywords: تشخیص بدافزار; Malware detection; API call statistics; Hybrid wrapper–filter heuristics
Keywords: تشخیص بدافزار; Immune cooperation mechanism; Learning framework; Feature extraction; Malware detection; Artificial immune system;
Keywords: تشخیص بدافزار; Malware detection; Data mining; Mobile internet; Contraction clustering; SMMDS
Keywords: تشخیص بدافزار; End point security; Malware analysis; Malware detection; Metamorphic malware; Window of difference; Control flow analysis; Heuristics; Data mining
Keywords: تشخیص بدافزار; Malware detection; User-intention; Static program analysis; Android malware; User-trigger dependence;
Keywords: تشخیص بدافزار; Integrity modeling; Invariants detection; Malware detection; Static analysis; Tools
Keywords: تشخیص بدافزار; Computer security; Malware; Malware detection; API call graph; API call graph construction algorithm; API call graph matching algorithm
Keywords: تشخیص بدافزار; Botnet detection; Malware detection; Methods comparison; Botnet dataset; Anomaly detection; Network traffic
Keywords: تشخیص بدافزار; Android security; Malware detection; Privacy leakage
Keywords: تشخیص بدافزار; Malware detection; Instruction sequence; Sequential pattern mining; Classification
Keywords: تشخیص بدافزار; Machine learning; Malware detection; Static analysis; Structural features; Microsoft office open xml; Document
Machine learning-assisted signature and heuristic-based detection of malwares in Android devices
Keywords: تشخیص بدافزار; Malware detection; Hybrid approach; Android applications; Security; Heuristic analysis;
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
Keywords: تشخیص بدافزار; Cyber-threat; Malware detection; Run-time behaviour analysis; Significant malware behaviour, feature selection;
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware
Keywords: تشخیص بدافزار; Android security; Code packing technique; Code unpacking; Malware detection;
DroidDet: Effective and robust detection of android malware using static analysis along with rotation forest model
Keywords: تشخیص بدافزار; Rotation forests; Malware detection; Neural Network; Mobile phones;
Learning communication patterns for malware discovery in HTTPs data
Keywords: تشخیص بدافزار; Hadoop; HTTPs data; Malware detection; GMM;
Scalable Detection of Server-Side Polymorphic Malware
Keywords: تشخیص بدافزار; Malware Detection; Server-Side Polymorphism; Locality-Sensitive Hashing;
CloudIntell: An intelligent malware detection system
Keywords: تشخیص بدافزار; Malware analysis; Machine learning; Cloud; Decision tree; Boosting; SVM; Security; Malware detection; Portable executable; AWS;
Ransomware early detection by the analysis of file sharing traffic
Keywords: تشخیص بدافزار; Ransomware; Malware detection; Traffic analysis; Network security;
MAAR: Robust features to detect malicious activity based on API calls, their arguments and return values
Keywords: تشخیص بدافزار; Dynamic malware analysis; Behavior malware analysis; Malware detection; Return value API calls arguments; Feature generation;
PbMMD: A novel policy based multi-process malware detection
Keywords: تشخیص بدافزار; Malware detection; Behavior-based detection; Multi-process malware; Reinforcement Learning;
A pragmatic android malware detection procedure
Keywords: تشخیص بدافزار; Android; Malware detection; Static analysis; Machine learning; Classification; Ensemble learning; Feature selection;
Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor
Keywords: تشخیص بدافزار; Virtual machine monitor; Virtual machine introspection; Memory forensics analysis; Malware detection; Feature selection methods; Machine learning techniques; Semantic gap;
FindMal: A file-to-file social network based malware detection framework
Keywords: تشخیص بدافزار; Malware detection; File relation graph; Graph feature; Label propagation; Active learning;
Minimal contrast frequent pattern mining for malware detection
Keywords: تشخیص بدافزار; Malware detection; Static analysis; Code obfuscation; Code graph; Subgraph isomorphism; Minimal contrast frequent subgraph mining;
Dynamic VSA: a framework for malware detection based on register contents
Keywords: تشخیص بدافزار; Malware detection; API call; Dynamic analysis; CPU register values; x86 Registers values
Hypervisor-based malware protection with AccessMiner
Keywords: تشخیص بدافزار; Malware detection; OS protection; Behavioral-based detection; Hypervisor
A novel method for malware detection on ML-based visualization technique
Keywords: تشخیص بدافزار; Malware detection; Adversarial training; Adversarial examples; Image texture; Data visualization; 00-01; 99-00;
Malware detection by pruning of parallel ensembles using harmony search
Keywords: تشخیص بدافزار; Malware detection; Ensemble learning; Ensemble pruning; Harmony search; Classification
Hunting in the enterprise: Forensic triage and incident response
Keywords: تشخیص بدافزار; Triage; Digital forensics; Incident response; Information security; Malware detection; Scalable investigation; Enterprise fleet management
A fast malware detection algorithm based on objective-oriented association mining
Keywords: تشخیص بدافزار; Malware detection; Objective-oriented associate mining; Security; Classification; Machine learning
Behavioral classification and detection of malware through HTTP user agent anomalies
Keywords: تشخیص بدافزار; Malware detection; HTTP user agents; Clustering; Signatures
Opcode sequences as representation of executables for data-mining-based unknown malware detection
Keywords: تشخیص بدافزار; Malware detection; Computer security; Data mining; Machine learning; Supervised learning
Malware target recognition via static heuristics
Keywords: تشخیص بدافزار; Malware detection; Intrusion detection; Malware; Situation awareness; Machine learning
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
Keywords: تشخیص بدافزار; Keystroke dynamics; Authentication; Malware detection; Forgery; Bot; Attack; Classification