46
Views
1
CrossRef citations to date
0
Altmetric
Articles

OSX malware detection : Challenges and solutions

&

References

  • Huda, Shamsul, et al. “A hybrid-multi filter-wrapper framework to identify run-time behavior for fast malware detection.” Future Generation Computer Systems 83 (2018): 193-207. doi: 10.1016/j.future.2017.12.037
  • Baldwin, James, and Ali Dehghantanha. “Leveraging support vector machine for opcode density-based detection of crypto-ransomware.” Cyber Threat Intelligence. Springer, Cham, 2018. 107-136.
  • Bhatt, ArpitaJadhav, Chetna Gupta, and Sangeeta Mittal. “iABC-AL: Active learning-based privacy leaks threat detection for iOS applications.” Journal of King Saud University-Computer and Information Sciences (2018).
  • Zhang, Hanqi, et al. “Classification of ransomware families with machine learning based on N-gram of opcodes.” Future Generation Computer Systems 90 (2019): 211-221. doi: 10.1016/j.future.2018.07.052
  • Riasat, Rubata, et al. “Onamd: An Online Android Malware Detection Approach.” 2018 International Conference on Machine Learning and Cybernetics (ICMLC). Vol. 1. IEEE, 2018.
  • Abro, F. I. (2018). Investigating Android permissions and intents for malware detection (Doctoral dissertation, City, University of London).
  • Abro, FauziaIdrees. Investigating Android permissions and intents for malware detection. Diss. City, University of London, 2018.
  • Cohen, Yehonatan, Danny Hendler, and Amir Rubin. “Detection of malicious webmail attachments based on propagation patterns.” Knowledge-Based Systems 141 (2018): 67-79. doi: 10.1016/j.knosys.2017.11.011
  • Xiao, L., Ouyang, H., Fan, C. et al. Gesture image segmentation with Otsu’s method based on noise adaptive angle threshold. Multimed Tools Appl (2020)
  • Arora, Anshul, et al. “Poster: Hybrid Android Malware Detection by Combining Supervised and Unsupervised Learning.” Proceedings of the 24th Annual International Conference on Mobile Computing and Networking. ACM, 2018
  • Case, Andrew, and Golden G. Richard III. “Detecting objective-C malware through memory forensics.” Digital Investigation 18 (2016): S3-S10. doi: 10.1016/j.diin.2016.04.017
  • Pajouh, Hamed Haddad, et al. “Intelligent OS X malware threat detection with code inspection.” Journal of Computer Virology and Hacking Techniques 14.3 (2018): 213-223. doi: 10.1007/s11416-017-0307-5
  • Case, Andrew, and Golden G. Richard III. “Advancing Mac OS X rootkit detection.” Digital Investigation 14 (2015): S25-S33. doi: 10.1016/j.diin.2015.05.005
  • Pengfei, Jia, Zhang Chunkai, and He Zhenyu. “A new sampling approach for classification of imbalanced data sets with high density.” 2014 International Conference on Big Data and Smart Computing (BIGCOMP). IEEE, 2014.
  • Chen, Dong. “Optimization algorithm of redundant data classification in distributed database.” Journal of Discrete Mathematical Sciences and Cryptography 21.2 (2018): 439-444. doi: 10.1080/09720529.2018.1449325
  • Suman, Sujay Kumar, and Nishtha Hooda. “Predicting risk of Cervical Cancer: A case study of machine learning.” Journal of Statistics and Management Systems 22.4 (2019): 689-696. doi: 10.1080/09720510.2019.1611227
  • Arora, Amandeep Singh, Barkha Bahl, and Linesh Raja. “Diverse real-time attack traffic forecasting for cloud platforms.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 541-555. doi: 10.1080/09720529.2019.1638579
  • Džeroski, Saso, and Bernard Ženko. “Is combining classifiers with stacking better than selecting the best one?.” Machine learning 54.3 (2004): 255-273. doi: 10.1023/B:MACH.0000015881.36452.6e

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.