In the field of adversarial attacks, the generative adversarial network (GAN) has shown better performance. There have been few studies applying it to malware sample supplementation, due to the complexity of handling discrete data. More importantly, unbalanced malware family samples interfere with the analytical power of malware detection models and mislead malware classification. To address the problem of the impact of malware family imbalance on accuracy, a selection feature conditional Wasserstein generative adversarial network (SFCWGAN) and bidirectional temporal convolutional network (BiTCN) are proposed. First, we extract the features of malware Opcode and API sequences and use Word2Vec to represent features, emphasizing the semantic ...
Malware is one of the most frequent cyberattacks, with its prevalence growing daily across the netwo...
We present a new algorithm to train a robust malware detector. Malware is a prolific problem and mal...
Dynamic malware analysis executes the program in an isolated environment and monitors its run-time b...
The number of new malware has been increasing year by year, and the construction of the malware samp...
For efficient malware removal, determination of malware threat levels, and damage estimation, malwar...
Malware detection and analysis are important topics in cybersecurity. For efficient malware removal,...
It is not easy to extract essential features from a sequence of security data. It requires smart sec...
Recent ransomware attacks threaten not only personal files but also critical infrastructure like sma...
Currently, malware shows an explosive growth trend. Demand for classifying malware is also increasin...
Machine learning is widely used for detecting and classifying malware. Unfortunately, machine learni...
As malware continues to evolve, deep learning models are increasingly used for malware detection and...
Intrusion Detection Systems (IDS) are essential components in preventing malicious traffic from pene...
Generative Adversarial Networks (GANs) have seen significant interest since their introduction in 20...
Cavazos, JohnBad actors have embraced automation and current malware analysis systems cannot keep up...
The increase in number and variety of malware samples amplifies the need for improvement in automati...
Malware is one of the most frequent cyberattacks, with its prevalence growing daily across the netwo...
We present a new algorithm to train a robust malware detector. Malware is a prolific problem and mal...
Dynamic malware analysis executes the program in an isolated environment and monitors its run-time b...
The number of new malware has been increasing year by year, and the construction of the malware samp...
For efficient malware removal, determination of malware threat levels, and damage estimation, malwar...
Malware detection and analysis are important topics in cybersecurity. For efficient malware removal,...
It is not easy to extract essential features from a sequence of security data. It requires smart sec...
Recent ransomware attacks threaten not only personal files but also critical infrastructure like sma...
Currently, malware shows an explosive growth trend. Demand for classifying malware is also increasin...
Machine learning is widely used for detecting and classifying malware. Unfortunately, machine learni...
As malware continues to evolve, deep learning models are increasingly used for malware detection and...
Intrusion Detection Systems (IDS) are essential components in preventing malicious traffic from pene...
Generative Adversarial Networks (GANs) have seen significant interest since their introduction in 20...
Cavazos, JohnBad actors have embraced automation and current malware analysis systems cannot keep up...
The increase in number and variety of malware samples amplifies the need for improvement in automati...
Malware is one of the most frequent cyberattacks, with its prevalence growing daily across the netwo...
We present a new algorithm to train a robust malware detector. Malware is a prolific problem and mal...
Dynamic malware analysis executes the program in an isolated environment and monitors its run-time b...