A comprehensive survey on deep learning based malware detection techniques
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A comprehensive survey on deep learning based malware detection techniques
Authors
Keywords
-
Journal
Computer Science Review
Volume 47, Issue -, Pages 100529
Publisher
Elsevier BV
Online
2022-12-22
DOI
10.1016/j.cosrev.2022.100529
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- HamDroid: permission-based harmful android anti-malware detection using neural networks
- (2022) Saeed Seraj et al. NEURAL COMPUTING & APPLICATIONS
- An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks
- (2022) Iman Almomani et al. IEEE Access
- A new approach for APT malware detection based on deep graph network for endpoint systems
- (2022) Cho Do Xuan et al. APPLIED INTELLIGENCE
- Deep Learning based Cross Architecture Internet of Things malware Detection and Classification
- (2022) Rajasekhar Chaganti et al. COMPUTERS & SECURITY
- Windows and IoT malware visualization and classification with deep CNN and Xception CNN using Markov images
- (2022) Osho Sharma et al. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS
- A novel approach for detecting advanced persistent threats
- (2022) Jaafer Al-Saraireh et al. Egyptian Informatics Journal
- MFMCNS: a multi-feature and multi-classifier network-based system for ransomworm detection
- (2022) Ahmad O. Almashhadani et al. COMPUTERS & SECURITY
- DroidMalwareDetector: A novel Android malware detection framework based on convolutional neural network
- (2022) Abdullah Talha Kabakus EXPERT SYSTEMS WITH APPLICATIONS
- An Advanced Computing Approach for IoT-Botnet Detection in Industrial Internet of Things
- (2022) Tu N. Nguyen et al. IEEE Transactions on Industrial Informatics
- An Android Malware Detection and Classification Approach Based on Contrastive Lerning
- (2022) Shaojie Yang et al. COMPUTERS & SECURITY
- Android malware detection based on multi-head squeeze-and-excitation residual network
- (2022) Hui-juan Zhu et al. EXPERT SYSTEMS WITH APPLICATIONS
- Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic
- (2022) Eduardo Berrueta et al. EXPERT SYSTEMS WITH APPLICATIONS
- BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare
- (2022) Mohammad Wazid et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- An ontology-driven framework for knowledge representation of digital extortion attacks
- (2022) Masoudeh Keshavarzi et al. COMPUTERS IN HUMAN BEHAVIOR
- ProDroid – An Android malware detection framework based on profile hidden Markov model
- (2021) Satheesh Kumar Sasidharan et al. Pervasive and Mobile Computing
- Q-learning and LSTM based deep active learning strategy for malware defense in industrial IoT applications
- (2021) Sunder Ali Khowaja et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A survey of malware detection in Android apps: Recommendations and perspectives for future research
- (2021) Asma Razgallah et al. Computer Science Review
- A novel approach for APT attack detection based on combined deep learning model
- (2021) Cho Do Xuan et al. NEURAL COMPUTING & APPLICATIONS
- Comparative analysis of Android and iOS from security viewpoint
- (2021) Shivi Garg et al. Computer Science Review
- GDroid: Android malware detection and classification with graph convolutional network
- (2021) Han Gao et al. COMPUTERS & SECURITY
- Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game
- (2021) Talal Halabi et al. IEEE TRANSACTIONS ON RELIABILITY
- A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution
- (2021) Mirabelle Dib et al. IEEE Transactions on Network and Service Management
- Dual Generative Adversarial Networks Based Unknown Encryption Ransomware Attack Detection
- (2021) Xueqin Zhang et al. IEEE Access
- Efficient Deep Learning Network With Multi-Streams for Android Malware Family Classification
- (2021) Hyun-Il Kim et al. IEEE Access
- CNN-Based Malware Variants Detection Method for Internet of Things
- (2021) Qi Li et al. IEEE Internet of Things Journal
- PROUD-MAL: static analysis-based progressive framework for deep unsupervised malware classification of windows portable executable
- (2021) Syed Khurram Jah Rizvi et al. Complex & Intelligent Systems
- Android malware obfuscation variants detection method based on multi-granularity opcode features
- (2021) Junwei Tang et al. Future Generation Computer Systems-The International Journal of eScience
- IoT Malware Classification Based on Lightweight Convolutional Neural Networks
- (2021) Baoguo Yuan et al. IEEE Internet of Things Journal
- A Time-Efficient Approach Toward DDoS Attack Detection in IoT Network Using SDN
- (2021) Jalal Bhayo et al. IEEE Internet of Things Journal
- A Content-Based Ransomware Detection and Backup Solid-State Drive for Ransomware Defense
- (2021) Donghyun Min et al. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
- IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks
- (2021) Muhammad Naveed Aman et al. IEEE Systems Journal
- The rise of machine learning for detection and classification of malware: Research developments, trends and challenges
- (2020) Daniel Gibert et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Method for Windows Malware Detection Based on Deep Learning
- (2020) Xiang Huang et al. Journal of Signal Processing Systems for Signal Image and Video Technology
- On Existence of Common Malicious System Call Codes in Android Malware Families
- (2020) Roopak Surendran et al. IEEE TRANSACTIONS ON RELIABILITY
- Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review
- (2020) Priyanka Dixit et al. Computer Science Review
- Defense Against Advanced Persistent Threat Through Data Backup and Recovery
- (2020) Lu-Xing Yang et al. IEEE Transactions on Network Science and Engineering
- Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT
- (2020) Rahim Taheri et al. IEEE Transactions on Industrial Informatics
- RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows
- (2020) Runqing Yang et al. IEEE Transactions on Dependable and Secure Computing
- A Multi-Level Deep Learning System for Malware Detection
- (2019) Wei Zhong et al. EXPERT SYSTEMS WITH APPLICATIONS
- MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics
- (2019) Weijie Han et al. COMPUTERS & SECURITY
- On the effectiveness of system API-related information for Android ransomware detection
- (2019) Michele Scalas et al. COMPUTERS & SECURITY
- An efficient route planning model for mobile agents on the internet of things using Markov decision process
- (2019) Shamim Yousefi et al. Ad Hoc Networks
- Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics
- (2018) Krzysztof Cabaj et al. COMPUTERS & ELECTRICAL ENGINEERING
- Early-stage malware prediction using recurrent neural networks
- (2018) Matilda Rhode et al. COMPUTERS & SECURITY
- R-Locker: Thwarting ransomware action through a honeyfile-based approach
- (2018) J.A. Gómez-Hernández et al. COMPUTERS & SECURITY
- Deep learning at the shallow end: Malware classification for non-domain experts
- (2018) Quan Le et al. Digital Investigation
- A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
- (2018) Shamsul Huda et al. Future Generation Computer Systems-The International Journal of eScience
- Detection of advanced persistent threat using machine-learning correlation analysis
- (2018) Ibrahim Ghafir et al. Future Generation Computer Systems-The International Journal of eScience
- Protecting against Ransomware: A New Line of Research or Restating Classic Ideas?
- (2018) Amin Kharraz et al. IEEE SECURITY & PRIVACY
- LEILA: formaL tool for idEntifying mobIle maLicious behAviour
- (2018) Gerardo Canfora et al. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
- Evaluating model checking for cyber threats code obfuscation identification
- (2018) Fabio Martinelli et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining
- (2018) Nir Nissim et al. KNOWLEDGE-BASED SYSTEMS
- Ransomware detection method based on context-aware entropy analysis
- (2018) Sangmoon Jung et al. SOFT COMPUTING
- Malware Threats and Detection for Industrial Mobile-IoT Networks
- (2018) Shaila Sharmeen et al. IEEE Access
- IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?
- (2018) Liang Xiao et al. IEEE SIGNAL PROCESSING MAGAZINE
- Ransomware early detection by the analysis of file sharing traffic
- (2018) Daniel Morato et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Current research on Internet of Things (IoT) security: A survey
- (2018) Mardiana binti Mohamad Noor et al. Computer Networks
- DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
- (2018) Sajad Homayoun et al. Future Generation Computer Systems-The International Journal of eScience
- MalInsight: A systematic profiling based malware detection framework
- (2018) Weijie Han et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Multimodal Deep Learning Method for Android Malware Detection Using Various Features
- (2018) TaeGuen Kim et al. IEEE Transactions on Information Forensics and Security
- Android malware detection based on system call sequences and LSTM
- (2017) Xi Xiao et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
- (2017) Chuanlong Yin et al. IEEE Access
- Detecting crypto-ransomware in IoT networks based on energy consumption footprint
- (2017) Amin Azmoodeh et al. Journal of Ambient Intelligence and Humanized Computing
- Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence
- (2017) Sajad Homayoun et al. IEEE Transactions on Emerging Topics in Computing
- Hybrids of support vector machine wrapper and filter based framework for malware detection
- (2016) Shamsul Huda et al. Future Generation Computer Systems-The International Journal of eScience
- Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall
- (2016) Krzysztof Cabaj et al. IEEE NETWORK
- Droiddetector: android malware characterization and detection using deep learning
- (2016) Zhenlong Yuan et al. TSINGHUA SCIENCE AND TECHNOLOGY
- A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks
- (2016) Hamed Haddad Pajouh et al. IEEE Transactions on Emerging Topics in Computing
- Profiling and classifying the behavior of malicious codes
- (2015) Mamoun Alazab JOURNAL OF SYSTEMS AND SOFTWARE
- Deep learning
- (2015) Yann LeCun et al. NATURE
- Droid-Sec
- (2015) Zhenlong Yuan et al. ACM SIGCOMM Computer Communication Review
- FlowDroid
- (2014) Steven Arzt et al. ACM SIGPLAN NOTICES
- TaintDroid
- (2014) William Enck et al. ACM TRANSACTIONS ON COMPUTER SYSTEMS
- Novel active learning methods for enhanced PC malware detection in windows OS
- (2014) Nir Nissim et al. EXPERT SYSTEMS WITH APPLICATIONS
- Malware analysis using visualized images and entropy graphs
- (2014) Kyoung Soo Han et al. International Journal of Information Security
- Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
- (2014) Michael Spreitzenbarth et al. International Journal of Information Security
- Linear SVM-Based Android Malware Detection for Reliable IoT Services
- (2014) Hyo-Sik Ham et al. Journal of Applied Mathematics
- Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
- (2013) Vaibhav Rastogi et al. IEEE Transactions on Information Forensics and Security
- “Andromaly”: a behavioral malware detection framework for android devices
- (2011) Asaf Shabtai et al. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS
- Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
- (2010) Asaf Shabtai et al. JOURNAL OF SYSTEMS AND SOFTWARE
- A new similarity measure for histogram comparison and its application in time series analysis
- (2008) V.V. Strelkov PATTERN RECOGNITION LETTERS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started