Gandotra et al., 2019
| Publication | Publication Date | Title |
|---|---|---|
| US11277423B2 (en) | Anomaly-based malicious-behavior detection | |
| Milajerdi et al. | Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting | |
| US11882134B2 (en) | Stateful rule generation for behavior based threat detection | |
| Roseline et al. | A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks | |
| Kharaz et al. | {UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware | |
| US10581879B1 (en) | Enhanced malware detection for generated objects | |
| EP3531329B1 (en) | Anomaly-based-malicious-behavior detection | |
| Jang et al. | Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information | |
| US10122742B1 (en) | Classifying software modules based on comparisons using a neighborhood distance metric | |
| JP2019082989A (en) | Systems and methods of cloud detection, investigation and elimination of targeted attacks | |
| Talukder | Tools and techniques for malware detection and analysis | |
| US11693961B2 (en) | Analysis of historical network traffic to identify network vulnerabilities | |
| US20070107058A1 (en) | Intrusion detection using dynamic tracing | |
| Čeponis et al. | Towards a robust method of dataset generation of malicious activity for anomaly-based HIDS training and presentation of AWSCTD dataset | |
| US20240054215A1 (en) | Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program | |
| US20240054210A1 (en) | Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program | |
| Huang et al. | {DONAPI}: Malicious {NPM} Packages Detector using Behavior Sequence Knowledge Mapping | |
| Luh et al. | AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes | |
| Yin et al. | Automatic malware analysis: an emulator based approach | |
| Gandotra et al. | Malware intelligence: beyond malware analysis | |
| Zheng et al. | Towards robust detection of open source software supply chain poisoning attacks in industry environments | |
| Huertas Celdrán et al. | Creation of a dataset modeling the behavior of malware affecting the confidentiality of data managed by IoT devices | |
| US12368731B2 (en) | Cyber threat information processing apparatus, cyber threat information processing method, and storage medium storing cyber threat information processing program | |
| Ramadan et al. | Redline Stealer Malware Analysis with Surface, Runtime, and Static Code Methods | |
| Anand et al. | Malware Exposed: An In-Depth Analysis of its Behavior and Threats |