Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"A Comparison of Malware Detection Techniques Based on Hidden Markov Model"
written by Saja Alqurashi, Omar Batarfi,
published by Journal of Information Security, Vol.7 No.3, 2016
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Object Detection in Cybersecurity: A Review of Automation of Malware Detection
Global Perspectives on the Applications of …, 2024
[2] Family Classification based on Tree Representations for Malware
Proceedings of the 14th ACM SIGOPS Asia-Pacific …, 2023
[3] Familial Graph Classification of Malware based on Structured API Call Sequences
2023 IEEE 23rd International Conference on …, 2023
[4] Ransomware Taxonomy and Detection Techniques Based on Machine Learning: A Review
banaa, S Sahana, J Ali, S Das - International Conference on …, 2023
[5] A novel robust convolutional neural network for uniform resource locator classification from the view of cyber security
Concurrency and Computation: Practice and …, 2022
[6] A review of machine learning techniques in cybersecurity and research opportunities
Machine Learning for Cyber Security, 2022
[7] Скрытые марковские модели в задаче обнаружения атак на компьютерные сети
Чебышевский сборник, 2022
[8] Дискретные модели в задачах обнаружения атак на компьютерные сети
Председатель программного комитета–, 2022
[9] ЧЕБЫШЕВСКИЙ СБОРНИК
ЧЕБЫШЕВСКИЙ СБОРНИК Учредители: Тульский …, 2021
[10] A Complete Study on Malware Types and Detecting Ransomware Using API Calls
2021 9th International …, 2021
[11] Markov Models for Malware and Intrusion Detection: A Survey
Serdica Journal of Computing, 2021
[12] Comparative Performance Analysis of Anti-virus Software.
2021
[13] Malware detection with sequence-based machine learning and deep learning
2021
[14] Comparative Performance Analysis of Anti-virus Software
2021
[15] Malware Detection: Issues and Challenges
2021
[16] The Use2Use Design Toolkit—Tools for User-Centred Circular Design
Sustainability, 2021
[17] Machine learning in cybersecurity: a comprehensive survey
2020
[18] Compound Attack Prediction Method Based On Improved Algorithm Of Hidden Markov Model
2020
[19] Stealthy Malware Detection Based on Deep Neural Network
2020
[20] Detection of Anomalies in the Information Networks of Industrial Automation Systems Based on Artificial Immune Detectors
2019
[21] Теорія та практика створення розподілених систем виявлення зловмисного програмного забезпечення в локальних комп'ютерних мережах
2019
[22] Malwares: Creation and Avoidance
2019
[23] An Improved Method for Packed Malware Detection using PE Header and Section Table Information.
2019
[24] COMPARATIVE ANALYSIS OF MALWARE DETECTION TECHNIQUES USING SIGNATURE, BEHAVIOUR AND HEURISTICS
2019
[25] An Improved Method for Packed Malware Detection using PE Header and Section Table Information
2019
[26] An improved DDoS Detection Using Hybrid N-Gram Heuristic Technique
2018
[27] A Two-stage Malware Detection Architecture Inspired by Human Immune System
2018
[28] DDoS Detection on Network Protocol Using Cosine Similarity and N-Gram+ Method
2018
[29] Crypto-Ransomware Detection through the Use of k-Nearest Neighbor Machine Learning Algorithm
2018
[30] ОБНАРУЖЕНИЕ ВРЕДОНОСНОГО ПРОГРАММНОГО ОБЕСПЕЧЕНИЯ С ИСПОЛЬЗОВАНИЕМ ИММУННЫХ ДЕТЕКТОРОВ
2017
[31] Deep learning for malicious flow detection
2017
[32] Proposing an efficient approach for malware clustering
2017
[33] Multiple Sequential Data Modeling with Extended Hidden Semi-Markov Models and Its Data Aggregation and Management
2017
[34] Malware detection vectors and analysis techniques: A brief survey
2016
[35] Hidden markov models in the problem of detecting attacks on computer networks
[36] Karma öznitelik kullanarak yazılım davranışlarının modellenmesi ve tespiti
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top