Malware is one of the most frequent cyberattacks, with its prevalence growing daily across the network. Malware traffic is always asymmetrical compared to benign traffic, which is always symmetrical. Fortunately, there are many artificial intelligence techniques that can be used to detect malware and distinguish it from normal activities. However, the problem of dealing with large and high-dimensional data has not been addressed enough. In this paper, a high-performance malware detection system using deep learning and feature selection methodologies is introduced. Two different malware datasets are used to detect malware and differentiate it from benign activities. The datasets are preprocessed, and then correlation-based feature selection ...
A tremendous number of malicious programs have posed severe and evolving security threats to operati...
Malware detection and classification are attracting more research nowadays due to the increasing num...
Malware is one of the most significant threats in today’s computing world since the number of websit...
Recent technological developments in computer systems transfer human life from real to virtual envir...
Cavazos, JohnBad actors have embraced automation and current malware analysis systems cannot keep up...
Malicious software (ransom ware) cyber attacks in frequency and severity, posing an increasingly ser...
Studies in the past have investigated the feasibility of using HPCs (Hardware Performance Counters) ...
In recent years, the diffusion of malicious software through various channels has gained the request...
Smartphone apps are closely integrated with our daily lives, and mobile malware has brought about se...
Malware attack is one of the most critical issues that electronic device users are facing in recent ...
Cyber-attacks on the numerous parts of today’s fast developing IoT are only going to increase in fre...
Due to its widespread use, with numerous applications deployed everyday, smartphones have become an ...
One of the most significant issues facing internet users nowadays is malware. Polymorphic malware is...
Malware detection plays a crucial role in computer security. Recent researches mainly use machine le...
Dynamic malware analysis executes the program in an isolated environment and monitors its run-time b...
A tremendous number of malicious programs have posed severe and evolving security threats to operati...
Malware detection and classification are attracting more research nowadays due to the increasing num...
Malware is one of the most significant threats in today’s computing world since the number of websit...
Recent technological developments in computer systems transfer human life from real to virtual envir...
Cavazos, JohnBad actors have embraced automation and current malware analysis systems cannot keep up...
Malicious software (ransom ware) cyber attacks in frequency and severity, posing an increasingly ser...
Studies in the past have investigated the feasibility of using HPCs (Hardware Performance Counters) ...
In recent years, the diffusion of malicious software through various channels has gained the request...
Smartphone apps are closely integrated with our daily lives, and mobile malware has brought about se...
Malware attack is one of the most critical issues that electronic device users are facing in recent ...
Cyber-attacks on the numerous parts of today’s fast developing IoT are only going to increase in fre...
Due to its widespread use, with numerous applications deployed everyday, smartphones have become an ...
One of the most significant issues facing internet users nowadays is malware. Polymorphic malware is...
Malware detection plays a crucial role in computer security. Recent researches mainly use machine le...
Dynamic malware analysis executes the program in an isolated environment and monitors its run-time b...
A tremendous number of malicious programs have posed severe and evolving security threats to operati...
Malware detection and classification are attracting more research nowadays due to the increasing num...
Malware is one of the most significant threats in today’s computing world since the number of websit...