Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2020
DOI: 10.1109/access.2019.2963724
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Review on Malware Detection Approaches

Abstract: According to the recent studies, malicious software (malware) is increasing at an alarming rate, and some malware can hide in the system by using different obfuscation techniques. In order to protect computer systems and the Internet from the malware, the malware needs to be detected before it affects a large number of systems. Recently, there have been made several studies on malware detection approaches. However, the detection of malware still remains problematic. Signature-based and heuristic-based detectio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
169
0
3

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 360 publications
(223 citation statements)
references
References 84 publications
0
169
0
3
Order By: Relevance
“…Let us denote the M N i output layer N, and b N i the base value, then, the filter for the jth feature map is ψ N i,j , and h j denotes the N − 1 th output layer. Then, the deep convolutional layers have the formulation as stated in Equation (8).…”
Section: Dcnn Feature Extraction and Fusionmentioning
confidence: 99%
See 1 more Smart Citation
“…Let us denote the M N i output layer N, and b N i the base value, then, the filter for the jth feature map is ψ N i,j , and h j denotes the N − 1 th output layer. Then, the deep convolutional layers have the formulation as stated in Equation (8).…”
Section: Dcnn Feature Extraction and Fusionmentioning
confidence: 99%
“…To counter these threats, deep learning, a technique based on artificial neural networks (ANN), can be employed successfully [7,8]. Deep learning with its multilayer architecture has a great ability to learn the features of the labeled and unlabeled data.…”
Section: Introductionmentioning
confidence: 99%
“…e proposed model has been tested on uniformly distributed dataset, more zero-day malware need to be tested. e test cases for malware is performed on virtual machines which can represent limited behaviors of malware [46]. us, running malware on real machine can improve the performance.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…e suggested schema will be integrated with other technologies such as cloud, blockchain, and deep learning to build more powerful detection system [46].…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…Malware and counterfeit components can decrease performance or cause performance instability. There is a plethora of security measures that can be adopted to prevent malicious programs from being downloaded and remove them when they have been downloaded [2,3]. There are also many novel ways of detecting counterfeit hardware [4,5].…”
Section: Introductionmentioning
confidence: 99%