Malware could be developed and transformed into various forms to deceive users and evade antivirus and security endpoint detection. Furthermore, if one machine in the network is compromised, it could be used for lateral movement--when malware spreads stealthily without sending an alarm to monitoring systems. Malware attacks pose security threats to modern enterprises and can cause massive financial, reputation, and data loss to major enterprises. Therefore, it is important to detect these attacks effectively to reduce the loss to the minimum level. The current research uses different approaches, including static and dynamic analysis, to detect and analyze malware categories using distinct feature sets, such as imported modules, opcodes, and...
Malicious software poses a serious threat to the cybersecurity of network infrastructures and is a g...
This paper proposes a scalable approach for distinguishing malicious files from clean files by inves...
There are two main components of malware analysis. One is static malware analysis and the other is d...
Malware could be developed and transformed into various forms to deceive users and evade antivirus a...
Malware has been one of the key concerns for Information Technology security researchers for decades...
My Ph.D. focuses on detecting malware by leveraging the information obtained at an instruction-level...
Malware is a serious threat being posed and it has been a continuous process of protecting the syste...
In malware detection, dynamic analysis extracts the runtime behavior of malware samples in a control...
Cavazos, JohnThe malware threat landscape is constantly evolving, with upwards of one million new va...
This paper presents a malware classification approach which aims to improve precision and support sc...
The spread of ransomware has risen exponentially over the past decade, causing huge financial damage...
The massive growth of computer usage has led to an increase in the related security concerns. Malwar...
This project aims to present the functionality and accuracy of five different machine learning algor...
Malicious software (malware) causes increasingly devastating social and financial losses each year. ...
Abstract: malicious software also known as malware are the critical security threat experienced by t...
Malicious software poses a serious threat to the cybersecurity of network infrastructures and is a g...
This paper proposes a scalable approach for distinguishing malicious files from clean files by inves...
There are two main components of malware analysis. One is static malware analysis and the other is d...
Malware could be developed and transformed into various forms to deceive users and evade antivirus a...
Malware has been one of the key concerns for Information Technology security researchers for decades...
My Ph.D. focuses on detecting malware by leveraging the information obtained at an instruction-level...
Malware is a serious threat being posed and it has been a continuous process of protecting the syste...
In malware detection, dynamic analysis extracts the runtime behavior of malware samples in a control...
Cavazos, JohnThe malware threat landscape is constantly evolving, with upwards of one million new va...
This paper presents a malware classification approach which aims to improve precision and support sc...
The spread of ransomware has risen exponentially over the past decade, causing huge financial damage...
The massive growth of computer usage has led to an increase in the related security concerns. Malwar...
This project aims to present the functionality and accuracy of five different machine learning algor...
Malicious software (malware) causes increasingly devastating social and financial losses each year. ...
Abstract: malicious software also known as malware are the critical security threat experienced by t...
Malicious software poses a serious threat to the cybersecurity of network infrastructures and is a g...
This paper proposes a scalable approach for distinguishing malicious files from clean files by inves...
There are two main components of malware analysis. One is static malware analysis and the other is d...