References
- H. J. van der Molen, “Forecasting Malware Conditions: Worsening Conditions, Some Bright Spots,” Inf. Secur. J., vol. 21, no. 5, pp. 269– 279, 2012.
- E. Gandotra, D. Bansal, and S. Sofat, “Malware Threat Assessment Using Fuzzy Logic Paradigm,” Cybern. Syst., vol. 48, no. 1, pp. 29–48, 2017. doi: 10.1080/01969722.2016.1262704
- A. Sharma and S. K. Sahay, “Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey,” Int. J. Comput. Appl., vol. 90, no. 2, pp. 7–11, 2014.
- S. K. Sahay, A. Sharma, and H. Rathore, “Evolution of Malware and Its Detection Techniques,” in Information and Communication Technology for Sustainable Development, Advances in Intelligent Systems and Computing, Springer Singapore, 2020, pp. 139–150.
- I. You and K. Yim, “Malware obfuscation techniques: A brief survey,” Proc. - 2010 Int. Conf. Broadband, Wirel. Comput. Commun. Appl. BWCCA 2010, pp. 297–300, 2010.
- P. Taylor et al., “Metamorphic Malware Detection Using Code Metrics,” no. December, pp. 37–41, 2014.
- Y. Dong, Z. Liu, Y. Yan, Y. Wang, T. Peng, and J. Zhang, “Machine Learning for Analyzing Malware,” vol. 10394, 2017, pp. 386–398.
- M. Ijaz, M. H. Durad, and M. Ismail, “Static and Dynamic Malware Analysis Using Machine Learning,” Proc. 2019 16th Int. Bhurban Conf. Appl. Sci. Technol. IBCAST 2019, pp. 687–691, 2019.
- H. Rathore, S. Agarwal, S. K. Sahay, and M. Sewak, Malware detection using machine learning and deep learning, vol. 11297 LNCS. Springer International Publishing, 2018.
- A. Kutlay and K. Karađuzović-Hadžiabdić, “Static Based Classification of Malicious Software Using Machine Learning Methods,” vol. 2, pp. 621–628, 2020.
- A. R. Mohammed, G. Sai Viswanath, K. Sai babu, and T. Anuradha, “Malware Detection in Executable Files Using Machine Learning,” Springer International Publishing, 2020, pp. 277–284.
- Yask, & Kumar, B. S. (2019). Construct the filter for malware detection in distributed control system. Journal of Information and Optimization Sciences, 40(5), 1155-1166. doi: 10.1080/02522667.2019.1642433
- A. Yewale and M. Singh, “Malware detection based on opcode frequency,” Proc. 2016 Int. Conf. Adv. Commun. Control Comput. Technol. ICACCCT 2016, no. 978, pp. 646–649, 2017.
- A. I. Elkhawas and N. Abdelbaki, “Malware Detection using Opcode Trigram Sequence with SVM,” 2018 26th Int. Conf. Software, Telecommun. Comput. Networks, SoftCOM 2018, pp. 7–11, 2018.
- M. Uchnar and P. Fecilak, “Behavioral malware analysis algorithm comparison,” pp. 397–400, 2019.
- O. E. David and N. S. Netanyahu, “DeepSign: Deep learning for automatic malware signature generation and classification,” Proc. Int. Jt. Conf. Neural Networks, vol. 2015-Septe, no. July, pp. 1–8, 2015.
- A. Irshad, R. Maurya, M. K. Dutta, R. Burget, and V. Uher, “Feature Optimization for Run Time Analysis of Malware in Windows Operating System using Machine Learning Approach,” 2019 42nd Int. Conf. Telecommun. Signal Process., pp. 255–260, 2019.
- R. Mosli, R. Li, B. Yuan, and Y. Pan, “A Behavior-Based Approach for Malware Detection,” 2017, pp. 187–201.
- M. Chowdhury, A. Rahman, and R. Islam, “Malware analysis and detection using data mining and machine learning classification,” Adv. Intell. Syst. Comput., vol. 580, pp. 266–274, 2018.
- C. T. Dan Lo, P. Ordóñez, and C. Cepeda, “Feature selection and improving classification performance for malware detection,” Proc. - 2016 IEEE Int. Conf. Big Data Cloud Comput. BDCloud 2016, Soc. Comput. Networking, Soc. 2016 Sustain. Comput. Commun. Sustain. 2016, pp. 560–566, 2016.