References
- Alaeiyan M, Parsa S, Conti M. Analysis and classification of context-based malware behavior. Comput Commun. 2019;136(136):76–90. doi: https://doi.org/10.1016/j.comcom.2019.01.003
- Singh J, Singh J. Ransomware an illustration of malicious cryptography. Int J Recen Technol Eng (IJRTE). 2019;8(2):1608–1611. doi: https://doi.org/10.35940/ijrte.B2327.078219
- Bulazel A, Yener B. (2017). A survey on automated dynamic malware analysis evasion and counter-evasion. Proceedings of the 1st Reversing and Offensive-Oriented Trends Symposium on - ROOTS, p. 1–21. doi: https://doi.org/10.1145/3150376.3150378
- Burnap P, French R, Turner F, et al. Malware classification using self organising feature maps and machine activity data. Compt Secur. 2017;73:399–410. doi: https://doi.org/10.1016/j.cose.2017.11.016
- Singh J, Singh J. Challenges of malware analysis: obfuscation techniques. Int J Inform Secur Sci. 2018;7(3):100–110.
- Wagner M, Rind A, Thür N, et al. A knowledge-assisted visual malware analysis system: design, validation, and reflection of KAMAS. Compt Secur. 2017;67:1–15. doi: https://doi.org/10.1016/j.cose.2017.02.003
- Mangialardo RJ, Duarte JC. Integrating static and dynamic malware analysis using machine learning. IEEE Latin Am Trans. 2015;13(9):3080–3087. doi: https://doi.org/10.1109/TLA.2015.7350062
- Mao W, Cai Z, Towsley D, et al. Security importance assessment for system objects and malware detection. Compt Secur. 2017;68:47–68. doi: https://doi.org/10.1016/j.cose.2017.02.009
- Jang D, Jeong Y, Lee S, et al. Rethinking anti-emulation techniques for large-scale software deployment. Compt Secur. 2019. doi: https://doi.org/10.1016/j.cose.2019.02.005
- Ming J, Xin Z, Lan P, et al. Impeding behavior-based malware analysis via replacement attacks to malware specifications. J Comp Virol Hack Technol. 2017;13(3):193–207. doi: https://doi.org/10.1007/s11416-016-0281-3
- Stiborek J, Pevný T, Rehák M. Multiple instance learning for malware classification. Expert Syst Appl. 2018;93:346–357. doi: https://doi.org/10.1016/j.eswa.2017.10.036
- Wuechner T, Cislak A, Ochoa M, et al. Leveraging compression-based graph mining for behavior-based malware detection. IEEE Trans Dependable Secure Comput. 2017;16:99–112. doi: https://doi.org/10.1109/TDSC.2017.2675881
- Zhang H, Xiao X, Mercaldo F, et al. Classification of ransomware families with machine learning based on N-gram of opcodes. Future Gener Comp Sys. 2019;90:211–221. doi: https://doi.org/10.1016/j.future.2018.07.052
- Zhang J. Machine learning with feature selection using principal component analysis for malware detection: a Case Study; January 2019.
- Ndibanje B, Kim KH, Kang YJ, et al. Applied sciences cross-method-based analysis and classification of malicious behavior by API calls extraction. Appl Sci. 2019. doi: https://doi.org/10.3390/app9020239
- Vasilescu M, Gheorghe L, Tapus N. Practical malware analysis based on sandboxing. Proceedings - RoEduNet IEEE International Conference; 2014; Bucharest, Romania. doi: https://doi.org/10.1109/RoEduNet-RENAM.2014.6955304
- Elhadi AAE, Maarof MA, Barry BIA. Improving the detection of malware behaviour using simplified data dependent API call graph.pdf. Int J Secur Its Appl. 2013;7(5):29–42.
- Ghiasi M, Sami A, Salehi Z. Dynamic VSA: a framework for malware detection based on register contents. Eng Appl Artif Int. 2015;44:111–122. doi: https://doi.org/10.1016/j.engappai.2015.05.008
- Pirscoveanu RS, Hansen SS, Larsen TMT, et al. Analysis of malware behavior: Type classification using machine learning. International Conference on Cyber Situational Awareness, Aalborg University, Denmark Data Analytics and Assessment (CyberSA); 2015 1–7.
- Ki Y, Kim E, Kim HK. A novel approach to detect malware based on API call sequence analysis. Int J Distrib Ser Network. 2015. DOI:https://doi.org/10.1155/2015/659101.
- Mira F, Brown A, Huang W. Novel malware detection methods by using LCS and LCSS. 2016 22nd International Conference on Automation and Computing, ICAC 2016: Tackling the New Challenges in Automation and Computing; 2016 554–559; Wurzburg, Germany. doi: https://doi.org/10.1109/IConAC.2016.7604978
- Cho IK, Kim TG, Shim YJ, et al. Malware analysis and classification using sequence alignments. Intell Autom Soft Comput. 2016;22:371–377. DOI:https://doi.org/10.1080/10798587.2015.1118916.
- Bidoki SM, Jalili S, Tajoddin A. PbMMD: a novel policy based multi-process malware detection. Eng Appl Artif Intell. 2017;60:57–70. doi: https://doi.org/10.1016/j.engappai.2016.12.008
- Pektaş A, Acarman T. Classification of malware families based on runtime behaviors. J Inform Secur Appl. 2017;37:91–100. doi: https://doi.org/10.1016/j.jisa.2017.10.005
- Damodaran A, Troia FD, Visaggio CA, et al. A comparison of static, dynamic, and hybrid analysis for malware detection. J. Comp Virol Hack Tech. 2017;13(1):1–12. doi: https://doi.org/10.1007/s11416-015-0261-z
- Ghafir I, Hammoudeh M, Prenosil V, et al. Detection of advanced persistent threat using machine-learning correlation analysis. Future Gener Comp Sys. 2018;89:349–359. doi: https://doi.org/10.1016/j.future.2018.06.055
- Huda S, Miah S, Mehedi Hassan M, et al. Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. Inform Sci. 2017;379:211–228. doi: https://doi.org/10.1016/j.ins.2016.09.041
- Han W, Xue J, Wang Y, et al. MalDAE : Detecting and explaining malware based on correlation and fusion of static and. Comp Secur. 2019;83:208–233. doi: https://doi.org/10.1016/j.cose.2019.02.007
- Malware Statistics & Trends Report. AV-TEST. 2019. https://www.avtest.org/en/statistics/malware
- Pan Z, Feng C, Tang C. Malware classification based on the behavior analysis and back propagation neural network. ITM Web Conf. 2016;7:1–5.
- Pfeffer A, Ruttenberg B, Kellogg L, et al. Artificial intelligence based malware analysis; 2019. p. 1–38. Availabe from: http://arxiv.org/abs/1704.08716