Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,232,158 papers from all fields of science
Search
Sign In
Create Free Account
Malware research
The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata. John von Neumann…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Automaton
Ciphertext
Computational complexity theory
Cryptography
Expand
Broader (1)
Malware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Towards a Fast Off-Line Static Malware Analysis Framework
Macdonald Chikapa
,
A. Namanya
6th International Conference on Future Internet…
2018
Corpus ID: 52967531
The profitability in cybercrime activity has resulted into an exponential growth of malware numbers and complexity. This has led…
Expand
2018
2018
Malware in Mobile Devices : A study of analysing the emerging threat landscape on mobile platforms
Anton Jörgensson
2018
Corpus ID: 169740847
Malicious software or malware are constantly on the rise and lately, we observe threats that differ from what we have seen before…
Expand
2017
2017
High-level malware behavioural patterns: Extractability evaluation
Jana St'astná
,
M. Tomásek
Conference on Computer Science and Information…
2017
Corpus ID: 8024122
Many promising malware research projects focus on malware behaviour analysis, however, in the end they tend to build new…
Expand
2015
2015
Multi-centroid Cluster Analysis in Malware Research
C. Oprisa
,
George Cabau
,
G. Sebestyen
A Bridge between Probability, Set Oriented…
2015
Corpus ID: 3763639
Verdicts assignment is a recurring problem in malware research and it involves deciding if a given program is clean or infected…
Expand
2014
2014
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
Abbas M. Al-Bakri
,
H. L. Hussein
2014
Corpus ID: 56388834
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify…
Expand
2014
2014
POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in Japan
Mitsuhiro Hatada
,
M. Terada
,
Tatsuya Mori
Conference on Computer and Communications…
2014
Corpus ID: 15092011
In 2008, the anti-Malware engineering WorkShop (MWS) was organized in Japan. The main objective of MWS is to accelerate and…
Expand
2013
2013
Application of string kernel based support vector machine for malware packer identification
Tao Ban
,
Ryoichi Isawa
,
Shanqing Guo
,
D. Inoue
,
K. Nakao
IEEE International Joint Conference on Neural…
2013
Corpus ID: 14383055
Packing is among the most popular obfuscation techniques to impede anti-virus scanners from successfully detecting malware. In…
Expand
2011
2011
Distributed malware analysis scheduling
R. Branco
,
Gabriel Negreira Barbosa
International Conference on Malicious and…
2011
Corpus ID: 33634041
Automation of malware analysis is a complex challenge faced by researchers due to the growing number of unique malware samples…
Expand
2011
2011
Iterative System Call Patterns Blow the Malware Cover
Mansour Ahmadi
,
A. Sami
,
Hossein Rahimi
,
Babak Yadegari
2011
Corpus ID: 61375672
2007
2007
On the Effort to Create Smartphone Worms in Windows Mobile
M. Becher
,
F. Freiling
,
B. Leider
IEEE SMC Information Assurance and Security…
2007
Corpus ID: 6314169
Compared to what we know about malware for desktop and server systems, we know almost nothing about malware for smartphones and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE