Cloud computing is a most inclining world view that gives conveyance of physical and intelligent assets as administrations over the Internet on request. Numerous malwares focus at customized personal computers (PCs) in cloud condition to obtain secret data and obstacle the cloud appropriation by organizations and clients. In this paper, we consider a way to deal with shielding the cloud from being assaulted by nearby PCs. Because of this issue, in view of the Windows Application Programming Interface (API) calls are removed from the Portable Executable (PE) files, we propose a novel Behavior-based Machine Learning Framework (BMLF) using Sparse Autoencoder (SpAE) which is worked in cloud stage for detection of malware. In the proposed BMLF, ...
IBMD(Intelligent Behavior-Based Malware Detection) aims to detect and mitigate malicious activities ...
With the advent of Internet of Things, we are facing an-other wave of malware attacks, that encompas...
Cloud computing technology is known as a distributed computing network, which consists of a large nu...
The Internet of Things (IoT) provides various benefits, which makes smart device even closer. With m...
These days, cloud computing is one of the most promising technologies to store information and provi...
Cloud infrastructure is vulnerable to malware due to its exposure to external adversaries, making it...
The number of services being offered by various cloud service providers (CSP) have recently exploded...
Cloud Computing platform is the practices of remote manage network resources such as storage, applic...
Enterprises and individual users heavily rely on the abilities of antiviruses and other security mec...
Part 7: MalwareInternational audienceThis paper introduces a novel online malware detection approach...
Nowadays, computer based technology has taken a central role in every person life. Hence, damage cau...
Abstract—In this work we focus on cloud-based malware detection. We investigate the existing academi...
Since cloud computing technology is growing day by day, it comes with many security problems, especi...
To ease the analysis of potentially malicious programs, dynamic behavior-based techniques have been ...
Malware programs, such as viruses, worms, Trojans, etc., are a worldwide epidemic in the digital wor...
IBMD(Intelligent Behavior-Based Malware Detection) aims to detect and mitigate malicious activities ...
With the advent of Internet of Things, we are facing an-other wave of malware attacks, that encompas...
Cloud computing technology is known as a distributed computing network, which consists of a large nu...
The Internet of Things (IoT) provides various benefits, which makes smart device even closer. With m...
These days, cloud computing is one of the most promising technologies to store information and provi...
Cloud infrastructure is vulnerable to malware due to its exposure to external adversaries, making it...
The number of services being offered by various cloud service providers (CSP) have recently exploded...
Cloud Computing platform is the practices of remote manage network resources such as storage, applic...
Enterprises and individual users heavily rely on the abilities of antiviruses and other security mec...
Part 7: MalwareInternational audienceThis paper introduces a novel online malware detection approach...
Nowadays, computer based technology has taken a central role in every person life. Hence, damage cau...
Abstract—In this work we focus on cloud-based malware detection. We investigate the existing academi...
Since cloud computing technology is growing day by day, it comes with many security problems, especi...
To ease the analysis of potentially malicious programs, dynamic behavior-based techniques have been ...
Malware programs, such as viruses, worms, Trojans, etc., are a worldwide epidemic in the digital wor...
IBMD(Intelligent Behavior-Based Malware Detection) aims to detect and mitigate malicious activities ...
With the advent of Internet of Things, we are facing an-other wave of malware attacks, that encompas...
Cloud computing technology is known as a distributed computing network, which consists of a large nu...