Daghmehchi Firoozjaei et al., 2022
| Publication | Publication Date | Title |
|---|---|---|
| Xiong et al. | Conan: A practical real-time apt detection system with high accuracy and efficiency | |
| US12019734B2 (en) | Methods and apparatus for control and detection of malicious content using a sandbox environment | |
| Catak et al. | A benchmark API call dataset for windows PE malware classification | |
| US11882134B2 (en) | Stateful rule generation for behavior based threat detection | |
| Daghmehchi Firoozjaei et al. | Memory forensics tools: a comparative analysis | |
| Talukder | Tools and techniques for malware detection and analysis | |
| Čeponis et al. | Towards a robust method of dataset generation of malicious activity for anomaly-based HIDS training and presentation of AWSCTD dataset | |
| Damopoulos et al. | Exposing mobile malware from the inside (or what is your mobile app really doing?) | |
| Yang et al. | Ratscope: Recording and reconstructing missing rat semantic behaviors for forensic analysis on windows | |
| Zhao et al. | Malicious executables classification based on behavioral factor analysis | |
| Tchakounté et al. | LimonDroid: a system coupling three signature-based schemes for profiling Android malware | |
| Continella et al. | Prometheus: Analyzing WebInject-based information stealers | |
| Kara | Cyber-espionage malware attacks detection and analysis: A case study | |
| Tari et al. | Data Exfiltration threats and prevention techniques: Machine Learning and memory-based data security | |
| Singh et al. | An efficient tactic for analysis and evaluation of malware dump file using the volatility tool | |
| Odebade et al. | Mitigating anti-forensics in the cloud via resource-based privacy preserving activity attribution | |
| CN117032894A (en) | Container security state detection method and device, electronic equipment and storage medium | |
| US20240396924A1 (en) | A top-down cyber security system and method | |
| US10546125B1 (en) | Systems and methods for detecting malware using static analysis | |
| BehradFar et al. | RAT hunter: Building robust models for detecting remote access trojans based on optimum hybrid features | |
| Leng et al. | MemInspect: Memory Forensics for investigating Fileless Attacks | |
| Bai et al. | Malware detection method based on dynamic variable length API sequence | |
| Harish et al. | Cross-Platform Analysis of Script-Based Fileless Malware Using Memory | |
| Amogh et al. | Classifying Memory Based Injections using Machine Learning | |
| Liu et al. | MalPEFinder: fast and retrospective assessment of data breaches in malware attacks |