About 1,370,000 results
Open links in new tab
    • Page Count: 12
    • File Size: 415KB
    We propose a novel behavioral malware detection approach based on a generic system-wide quantitative data flow model. We base our data flow analysis on the incremental construc-tion of aggregated …
    We propose a novel behavioral malware detection approach based on a generic system-wide quantitative data flow model. We base our data flow analysis on the incremental construc-tion of aggregated quantitative data flow graphs.
    Feedback
  1. A flow chart of malware detection approaches and …

    Cyber attackers employ malicious software (Malware) to compromise data integrity and exploit system resources. Tactics include transforming devices into remotely controlled assets or extorting...

  2. Malware detection with quantitative data flow graphs

    Jun 4, 2014 · We propose a novel behavioral malware detection approach based on a generic system-wide quantitative data flow model. We base our data flow analysis on the incremental …

    • Author: Tobias Wüchner, Martín Ochoa, Alexander Pretschner
    • Publish Year: 2014
  3. For an example of dynamical file analysis for malware detection, via emulation in a virtual environment. Here we give a few references to exemplify such methods.

  4. Flows of work for malware detection using machine learning

    To overcome the deficiency of the signature-based approach, we proposed a static malware detection system using data mining techniques to identify known and unknown malware by …

  5. Flow diagram for malware detection and classification …

    In this work, a method called, Luong Attention and Hosmer Lemeshow Regression Window‐based (LA‐HLRW) attack detection in 6G is proposed. Initially, with the raw Botnet Attack dataset obtained...

  6. Robust and Effective Malware Detection Through Quantitative …

    Jan 1, 2015 · We present a novel malware detection approach based on metrics over quantitative data flow graphs. Quantitative data flow graphs (QDFGs) model process behavior by …

  7. Many malware classification methods based on data flow graphs have been proposed. Some of them are based on user-defined features or graph similarity of data flow graphs. Graph neural …

  8. A Survey of Malware Classification Methods Based on Data Flow …

    Aug 10, 2022 · After analyzing the advantages and disadvantages of different data flow graph variants and their corresponding malware classification methods, this paper points out the …

  9. Data Flow Diagrams (DFDs) are the main input for threat modeling techniques such as Microsoft STRIDE or LINDDUN. They represent system-level abstractions that lack any architectural …

Refresh