Malware detection in industrial internet of things based on hybrid image visualization and deep learning model
暂无分享,去创建一个
Farhan Ullah | Saqib Saeed | Hamad Naeem | Shehzad Khalid | Danish Vasan | Sohail Jabbar | Muhammad Naeem | Sohail Jabbar | S. Khalid | M. Naeem | Farhan Ullah | Hamad Naeem | Danish Vasan | Saqib Saeed | Sohail Jabbar
[1] Srinivas Mukkamala,et al. Image visualization based malware detection , 2013, 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[2] Eul Gyu Im,et al. Malware analysis method using visualization of binary files , 2013, RACS.
[3] Farhan Ullah,et al. Identification of malicious code variants based on image visualization , 2019, Comput. Electr. Eng..
[4] Fadi Al-Turjman,et al. A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks , 2020, Ad Hoc Networks.
[5] Fadi Al-Turjman,et al. Secure data transmission framework for confidentiality in IoTs , 2019, Ad Hoc Networks.
[6] Jake Bouvrie,et al. Notes on Convolutional Neural Networks , 2006 .
[7] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[8] Abien Fred Agarap,et al. Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine (SVM) for Malware Classification , 2017, ArXiv.
[9] Eul Gyu Im,et al. Malware analysis using visualized images and entropy graphs , 2014, International Journal of Information Security.
[10] Yuval Elovici,et al. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey , 2009, Inf. Secur. Tech. Rep..
[11] Yao Du,et al. An Android Malware Detection Approach Using Community Structures of Weighted Function Call Graphs , 2017, IEEE Access.
[12] Divya Bansal,et al. Malware Analysis and Classification: A Survey , 2014 .
[13] Fadi Al-Turjman,et al. Quantifying Uncertainty in Internet of Medical Things and Big-Data Services Using Intelligence and Deep Learning , 2019, IEEE Access.
[14] Muhammad Ahsan Latif,et al. Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach , 2019, IEEE Access.
[15] Farhan Ullah,et al. Scalable Mutation Testing Using Predictive Analysis of Deep Learning Model , 2019, IEEE Access.
[16] Ali Hamzeh,et al. Visual malware detection using local malicious pattern , 2018, Journal of Computer Virology and Hacking Techniques.
[17] Songqing Yue,et al. Imbalanced Malware Images Classification: a CNN based Approach , 2017, ArXiv.
[18] Srinivas Mukkamala,et al. Packer identification using Byte plot and Markov plot , 2015, Journal of Computer Virology and Hacking Techniques.
[19] Jinjun Chen,et al. Detection of Malicious Code Variants Based on Deep Learning , 2018, IEEE Transactions on Industrial Informatics.
[20] Yang Wang,et al. Malware Classification with Deep Convolutional Neural Networks , 2018, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[21] KyoungSoo Han,et al. Malware Analysis Using Visualized Image Matrices , 2014, TheScientificWorldJournal.
[22] Rajesh Kumar,et al. Malicious Code Detection based on Image Processing Using Deep Learning , 2018, ICCAI 2018.
[23] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[24] David G. Lowe,et al. Object recognition from local scale-invariant features , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[25] B. S. Manjunath,et al. Malware images: visualization and automatic classification , 2011, VizSec '11.
[26] Chen Li,et al. Malware variant detection using similarity search over content fingerprint , 2014, The 26th Chinese Control and Decision Conference (2014 CCDC).
[27] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[28] Junfeng Wang,et al. Malware detection method based on the control-flow construct feature of software , 2014, IET Inf. Secur..
[29] Antonio Torralba,et al. Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope , 2001, International Journal of Computer Vision.
[30] Aziz Makandar,et al. Malware class recognition using image processing techniques , 2017, 2017 International Conference on Data Management, Analytics and Innovation (ICDMAI).