Windows PE malware detection using ensemble learning
NA Azeez, OE Odufuwa, S Misra, J Oluranti… - Informatics, 2021 - mdpi.com
In this Internet age, there are increasingly many threats to the security and safety of users
daily. One of such threats is malicious software otherwise known as malware (ransomware …
daily. One of such threats is malicious software otherwise known as malware (ransomware …
Swarm optimization and machine learning applied to PE malware detection towards cyber threat intelligence
SJ Kattamuri, RKV Penmatsa, S Chakravarty… - Electronics, 2023 - mdpi.com
Cyber threat intelligence includes analysis of applications and their metadata for potential
threats. Static malware detection of Windows executable files can be done through the …
threats. Static malware detection of Windows executable files can be done through the …
ReinforSec: an automatic generator of synthetic malware samples and denial-of-service attacks through reinforcement learning
A Hernandez-Suarez, G Sanchez-Perez… - Sensors, 2023 - mdpi.com
In recent years, cybersecurity has been strengthened through the adoption of processes,
mechanisms and rapid sources of indicators of compromise in critical areas. Among the …
mechanisms and rapid sources of indicators of compromise in critical areas. Among the …
Effect of PE file header features on accuracy
HH Al-Khshali, M Ilyas, ON Ucan - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Malware programmers look for ways to attack computers and networks. They try to find entry
points that bypass security and enable them to slip into the system. One of these ways is …
points that bypass security and enable them to slip into the system. One of these ways is …
[PDF][PDF] Impact of Portable Executable Header Features on Malware Detection Accuracy.
HH Al-Khshali, M Ilyas - Computers, Materials & Continua, 2023 - researchgate.net
One aspect of cybersecurity, incorporates the study of Portable Executables (PE) files
maleficence. Artificial Intelligence (AI) can be employed in such studies, since AI has the …
maleficence. Artificial Intelligence (AI) can be employed in such studies, since AI has the …
An effective hybrid approach of desirability, fuzzy logic, ANFIS and LAPO algorithm for optimizing compliant mechanism
NT Tran, N Le Chau, TP Dao - Engineering with Computers, 2021 - Springer
This paper proposes an efficient hybrid approach for solving multi-objective optimization
design of a compliant mechanism. The approach is developed by integrating desirability …
design of a compliant mechanism. The approach is developed by integrating desirability …
Feature reduction and optimization of malware detection system using ant colony optimization and rough sets
RKV Penmatsa, A Kalidindi… - International Journal of …, 2020 - igi-global.com
Malware is a malicious program that can cause a security breach of a system. Malware
detection and classification is one of the burning topics of research in information security …
detection and classification is one of the burning topics of research in information security …
A hybrid computational method of desirability, fuzzy logic, ANFIS, and LAPO algorithm for multiobjective optimization design of scott russell compliant mechanism
NT Tran, N Le Chau, TP Dao - Mathematical Problems in …, 2020 - Wiley Online Library
Flexure‐based compliant mechanisms are increasingly promising in precision engineering,
robotics, and other applications, thanks to the excellent advantages of no friction, no …
robotics, and other applications, thanks to the excellent advantages of no friction, no …
Generation of static YARA-signatures using genetic algorithm
A Zhdanov - 2019 IEEE European Symposium on Security and …, 2019 - ieeexplore.ieee.org
This article is dedicated to the subject of malware detection using static YARA-signatures
and Genetic Algorithm (GA). It proposes a solution and does a comparative analysis of two …
and Genetic Algorithm (GA). It proposes a solution and does a comparative analysis of two …
Design optimization for a compliant mechanism based on computational intelligence method
NL Chau, NT Tran, TP Dao - Neural Computing and Applications, 2021 - Springer
Modeling and optimization for compliant mechanisms are challenging tasks thanks to an
unclear kinematic merging among rigid and flexible links. Hence, this paper develops a …
unclear kinematic merging among rigid and flexible links. Hence, this paper develops a …
Copyright (c) 2017 Journal of Advanced Engineering and Computation