A survey of malware detection techniques

@inproceedings{Idika2007ASO,
  title={A survey of malware detection techniques},
  author={Nwokedi C. Idika and Aditya P. Mathur},
  year={2007}
}
Abstract 31 Introduction 42 What is Malware? 4 2.1 Who are the Users and Creators of Malware? . . . . . . . . . . . . . . . 6 3 The Malware Detector 64 Malware Detection Techniques 7 4.1 Anomaly-based Detection . . . . . . . . . . . . . . . . . . . . . . . . . . 94.1.1 Dynamic Anomaly-based Detection . . . . . . . . . . . . . . . . 104.1.2 Static Anomaly-based Detection . . . . . . . . . . . . . . . . . . 154.1.3 Hybrid Anomaly-based Detection . . . . . . . . . . . . . . . . . . 164.2 Speci… CONTINUE READING

Similar Papers

Figures, Tables, and Topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
SHOWING 1-10 OF 151 CITATIONS

Fall 2011 Graph Technique For Metamorphic Virus Detection

VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Data Analytics and Decision Support for Cybersecurity

VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Classifying Android Malware with Dynamic Behavior Dependency Graphs

  • 2016 IEEE Trustcom/BigDataSE/ISPA
  • 2016
VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

A feature selection method for malware detection

  • 2011 IEEE International Conference on Information and Automation
  • 2011
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Graph Technique For Metamorphic Virus Detection

VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2008
2019

CITATION STATISTICS

  • 13 Highly Influenced Citations

  • Averaged 12 Citations per year from 2017 through 2019

References

Publications referenced by this paper.