Essays about: "Malware Detection"
Showing result 1 - 5 of 40 essays containing the words Malware Detection.
-
1. Android Malware Detection Using Machine Learning
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. READ MORE
-
2. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE
-
3. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE
-
4. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE
-
5. Evaluation of machine learning models for classifying malicious URLs
University essay from Högskolan i Gävle/DatavetenskapAbstract : Millions of new websites are created daily, making it challenging to determine which ones are safe. Cybersecurity involves protecting companies and users from cyberattacks. Cybercriminals exploit various methods, including phishing attacks, to trick users into revealing sensitive information. READ MORE