共 47 条
[1]
Ahlashkari, VolMemLyzer, (2022)
[2]
Alani M.M., Big data in cybersecurity: a survey of applications and future trends, J. Reliab. Intell. Environ., 7, 2, pp. 85-114, (2021)
[3]
Alani M.M., Awad A.I., Paired: an explainable lightweight Android malware detection system, IEEE Access, 10, pp. 73214-73228, (2022)
[4]
Ali Z., Soomro T.R., An efficient mining based approach using pso selection technique for analysis and detection of obfuscated malware, J. Inf. Assur. Cyber Secur., 2018, pp. 1-13, (2018)
[5]
Aslan O.A., Samet R., A comprehensive review on malware detection approaches, IEEE Access, 8, pp. 6249-6271, (2020)
[6]
(2022)
[7]
Bacci A., Bartoli A., Martinelli F., Medvet E., Mercaldo F., Visaggio C.A., Impact of code obfuscation on Android malware detection based on static and dynamic analysis, ICISSP, pp. 379-385, (2018)
[8]
Barr-Smith F., Ugarte-Pedrero X., Graziano M., Spolaor R., Martinovic I., Survivalism: systematic analysis of windows malware living-off-the-land, 2021 IEEE Symposium on Security and Privacy (SP), pp. 1557-1574, (2021)
[9]
Carrier T., Victor P., Tekeoglu A., Lashkari A., Detecting obfuscated malware using memory feature engineering, Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, INSTICC, pp. 177-188, (2022)
[10]
Cisco Umbrella, Cybersecurity threat trends: phishing, crypto top the list, (2022)