2017 2nd International Conference on Computer and Communication Systems (ICCCS) 2017
DOI: 10.1109/ccoms.2017.8075178
|View full text |Cite
|
Sign up to set email alerts
|

Comparative study of recent MEA malware phylogeny

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…Arabia [20]. It appears that digital transformation has led to the wide usage of the internet and digitization in Saudi Arabia, making it the top priority for cyber criminals.…”
Section: Why Saudi Arabia Is the Biggest Target Of Cyber Criminals?mentioning
confidence: 99%
“…Arabia [20]. It appears that digital transformation has led to the wide usage of the internet and digitization in Saudi Arabia, making it the top priority for cyber criminals.…”
Section: Why Saudi Arabia Is the Biggest Target Of Cyber Criminals?mentioning
confidence: 99%
“…Black et al [11] perform an in-depth analysis of the key behaviors of banking malware families and how they have evolved over time. Moubarak et al [40] discuss malware evolution and the structural relationship between several potentially state-sponsored malware. In [51], the authors cluster Android malware samples and build a dendrogram of the malware families showing overlapping code snippets.…”
Section: Research Objectives: Detection Versus Analysismentioning
confidence: 99%
“…Until now, malware capability assessment has primarily been a manual effort [11,40,50], resulting in behavioral profiles that are quickly outdated. Although machine learning-based behavioral analysis approaches exist, they construct a single model that describes either the whole network or each protocol usage individually [47].…”
Section: Introductionmentioning
confidence: 99%
“…This paper is the result of a prolonged survey on viral techniques adopted by malware as we go through several computer virology studies [12] [13] [14]. Also, some malware samples were examined in real time against several analysis approaches [15] and in the other hand, many antiviral solutions were tested in different attack scenarios and networks. Moreover, several blockchain architecture types [16] were considered while developing the new malware.…”
Section: Introductionmentioning
confidence: 99%