Skip to search formSkip to main contentSkip to account menu

Malware

Known as: Stealthware, Malicious exploit, Badware 
Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Smartphone sales have recently experienced explosive growth. Their popularity also encourages malware authors to penetrate… 
Highly Cited
2011
Highly Cited
2011
We propose a simple yet effective method for visualizing and classifying malware using image processing techniques. Malware… 
Highly Cited
2011
Highly Cited
2011
Malicious software - so called malware - poses a major threat to the security of computer systems. The amount and diversity of… 
Highly Cited
2010
Highly Cited
2010
This article presents Andromaly—a framework for detecting malware on Android mobile devices. The proposed framework realizes a… 
Highly Cited
2009
Highly Cited
2009
Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated… 
Highly Cited
2008
Highly Cited
2008
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of… 
Highly Cited
2007
Highly Cited
2007
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of… 
Highly Cited
2007
Highly Cited
2007
Numerous attacks, such as worms, phishing, and botnets, threaten the availability of the Internet, the integrity of its hosts… 
Highly Cited
2007
Highly Cited
2007
We present a new kind of network perimeter monitoring strategy, which focuses on recognizing the infection and coordination… 
Highly Cited
2005
Highly Cited
2005
A malware detector is a system that attempts to determine whether a program has malicious intent. In order to evade detection…