共 47 条
- [1] Ahlashkari, VolMemLyzer, (2022)
- [2] Alani M.M., Big data in cybersecurity: a survey of applications and future trends, J. Reliab. Intell. Environ., 7, 2, pp. 85-114, (2021)
- [3] Alani M.M., Awad A.I., Paired: an explainable lightweight Android malware detection system, IEEE Access, 10, pp. 73214-73228, (2022)
- [4] Ali Z., Soomro T.R., An efficient mining based approach using pso selection technique for analysis and detection of obfuscated malware, J. Inf. Assur. Cyber Secur., 2018, pp. 1-13, (2018)
- [5] Aslan O.A., Samet R., A comprehensive review on malware detection approaches, IEEE Access, 8, pp. 6249-6271, (2020)
- [6] (2022)
- [7] Bacci A., Bartoli A., Martinelli F., Medvet E., Mercaldo F., Visaggio C.A., Impact of code obfuscation on Android malware detection based on static and dynamic analysis, ICISSP, pp. 379-385, (2018)
- [8] Barr-Smith F., Ugarte-Pedrero X., Graziano M., Spolaor R., Martinovic I., Survivalism: systematic analysis of windows malware living-off-the-land, 2021 IEEE Symposium on Security and Privacy (SP), pp. 1557-1574, (2021)
- [9] Carrier T., Victor P., Tekeoglu A., Lashkari A., Detecting obfuscated malware using memory feature engineering, Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, INSTICC, pp. 177-188, (2022)
- [10] Cisco Umbrella, Cybersecurity threat trends: phishing, crypto top the list, (2022)