2022
DOI: 10.1007/s42979-022-01433-1
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Framework for Metamorphic Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 11 publications
0
2
0
1
Order By: Relevance
“…The eutectic silicon content in an alloy is modified by adding sodium, strontium and phosphorus in the form of modifiers to refine the silicon morphology to improve the properties [6]. The silicon phase is also modified by changing the processing methods such as spray atomization and powder metallurgy route [7,8]. Spray forming technique is a rapid solidification process and is employed to produce near neat shaped products.…”
Section: Introductionmentioning
confidence: 99%
“…The eutectic silicon content in an alloy is modified by adding sodium, strontium and phosphorus in the form of modifiers to refine the silicon morphology to improve the properties [6]. The silicon phase is also modified by changing the processing methods such as spray atomization and powder metallurgy route [7,8]. Spray forming technique is a rapid solidification process and is employed to produce near neat shaped products.…”
Section: Introductionmentioning
confidence: 99%
“…To investigate security systems founded on distributed technology, featuring adaptable and open structures and incorporating the seamless integration of intrusion detection and defence technologies are proposed. Such research and development efforts are essential for advancing network information security technology and products towards comprehensive three-dimensional protection and bolstering national security defence initiatives [9].…”
mentioning
confidence: 99%
“…Для виявлення метаморфного зловмисного програмного забезпечення відомі підходи відрізняються набором ознак, за якими здійснюється віднесення досліджуваного зразка до одного із класів -ЗПЗ або довірених додатків [1][2][3][4][5]. Ці ознаки можуть включати як статичні так і динамічні атрибути, такі як опкоди (кодові інструкції), структуру графу потоку керування, АРІ виклики, поведінку виконуваних файлів (мережеву активність, зовнішнє середовище виконання, таке як наприклад, системний реєстр) або їх комбінації.…”
unclassified