2023
DOI: 10.3390/electronics12081861
|View full text |Cite
|
Sign up to set email alerts
|

Separating Malicious from Benign Software Using Deep Learning Algorithm

Abstract: The increased usage of the Internet raises cyber security attacks in digital environments. One of the largest threats that initiate cyber attacks is malicious software known as malware. Automatic creation of malware as well as obfuscation and packing techniques make the malicious detection processes a very challenging task. The obfuscation techniques allow malware variants to bypass most of the leading literature malware detection methods. In this paper, a more effective malware detection system is proposed. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 31 publications
0
1
0
Order By: Relevance
“…The researchers Chen, P.-Y. et al (2022) [30] from the Ching-Yi National University of Technology (Tai-wan) proposed a method for determining the distance to an object by using 3D LiDAR and merging heterogeneous sensors with a camera. This development is interesting in that the surveillance system is installed on a moving vehicle, and the Yolo-4 neural network is used to recognize objects.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The researchers Chen, P.-Y. et al (2022) [30] from the Ching-Yi National University of Technology (Tai-wan) proposed a method for determining the distance to an object by using 3D LiDAR and merging heterogeneous sensors with a camera. This development is interesting in that the surveillance system is installed on a moving vehicle, and the Yolo-4 neural network is used to recognize objects.…”
Section: Literature Reviewmentioning
confidence: 99%