@InProceedings{10.1007/978-3-031-35644-5_20, author="Kumar, Rajesh and Talwar, Rachit and Sharma, Manik and Kumari, Suchi and Goel, Shivani and Malhotra, Kanika and Ahmed, Faiz", editor="Garg, Deepak and Narayana, V. A. and Suganthan, P. N. and Anguera, Jaume and Koppula, Vijaya Kumar and Gupta, Suneet Kumar", title="Malware Detection in URL Using Machine Learning Approach", booktitle="Advanced Computing", year="2023", publisher="Springer Nature Switzerland", address="Cham", pages="251--263", isbn="978-3-031-35644-5" } @article{saha2023adversarial, title={Adversarial Robustness of Learning-based Static Malware Classifiers}, author={Saha, Shoumik and Wang, Wenxiao and Kaya, Yigitcan and Feizi, Soheil}, journal={arXiv preprint arXiv:2303.13372}, year={2023} } @article{okpongete2022intelligent, title={Intelligent Endpoint-based Ransomware Detection Framework}, author={Okpongete, Faith}, year={2022} } @article{장재석2022autoencoder, title={AutoEncoder 기반 역난독화 사전학습 및 전이학습을 통한 악성코드 탐지 방법론}, author={장재석 and 구본재 and 엄성준 and 한지형}, journal={한국정보처리학회 학술대회논문집}, volume={29}, number={2}, pages={905--907}, year={2022}, publisher={한국정보처리학회} } @InProceedings{10.1007/978-3-031-09484-2_3, author="Meloni, Francesco and Sanna, Alessandro and Maiorca, Davide and Giacinto, Giorgio", editor="Cavallaro, Lorenzo and Gruss, Daniel and Pellegrino, Giancarlo and Giacinto, Giorgio", title="Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware", booktitle="Detection of Intrusions and Malware, and Vulnerability Assessment", year="2022", publisher="Springer International Publishing", address="Cham", pages="42--52", isbn="978-3-031-09484-2" } @article{gao2022malware, title={Malware Detection by Control-Flow Graph Level Representation Learning With Graph Isomorphism Network}, author={Gao, Yun and Hasegawa, Hirokazu and Yamaguchi, Yukiko and Shimada, Hajime}, journal={IEEE Access}, volume={10}, pages={111830--111841}, year={2022}, publisher={IEEE} } @article{asghar2022sok, title={SoK: Use of Cryptography in Malware Obfuscation}, author={Asghar, Hassan Jameel and Zhao, Benjamin Zi Hao and Ikram, Muhammad and Nguyen, Giang and Kaafar, Dali and Lamont, Sean and Coscia, Daniel}, journal={arXiv preprint arXiv:2212.04008}, year={2022} } @article{wei2021toward, title={Toward identifying APT malware through API system calls}, author={Wei, Chaoxian and Li, Qiang and Guo, Dong and Meng, Xiangyu}, journal={Security and Communication Networks}, volume={2021}, pages={1--14}, year={2021}, publisher={Hindawi Limited} } @inproceedings{frederick2022corpus, title={A Corpus of Encoded Malware Byte Information as Images for Efficient Classification}, author={Frederick, Ryan and Shapiro, Joseph and Calix, Ricardo A}, booktitle={2022 16th International Conference on Signal-Image Technology \& Internet-Based Systems (SITIS)}, pages={32--36}, year={2022}, organization={IEEE} } @inproceedings{el2022comparison, title={Comparison of Feature Extraction and Classification Techniques of PE Malware}, author={El Neel, Leena and Copiaco, Abigail and Obaid, Walid and Mukhtar, Husameldin}, booktitle={2022 5th International Conference on Signal Processing and Information Security (ICSPIS)}, pages={26--31}, year={2022}, organization={IEEE} } @inproceedings{sharma2022deep, title={Deep Learning based Residual Attention Network for Malware Detection in CyberSecurity}, author={Sharma, Ruchi and Deshmukh, Shreyas and Mannava, Amartya and Birla, Pulkit}, booktitle={2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS)}, pages={851--856}, year={2022}, organization={IEEE} } @article{al2023ensemble, title={An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection}, author={Al-Andoli, Mohammed Nasser and Tan, Shing Chiang and Sim, Kok Swee and Goh, Pey Yun and Lim, Chee Peng}, journal={Journal of Intelligent \& Fuzzy Systems}, number={Preprint}, pages={1--17}, year={2023}, publisher={IOS Press} } @phdthesis{saracino2023machine, title={Machine Learning for malware characterization and identification}, author={Saracino, Marco}, year={2023}, school={Politecnico di Torino} } @article{abdelwahed2023detecting, title={Detecting Malware Activities with MalpMiner: A Dynamic Analysis Approach}, author={Abdelwahed, Mustafa F and Kamal, Mustafa M and Sayed, Samir G}, journal={IEEE Access}, year={2023}, publisher={IEEE} } @article{maniriho2022evaluation, title={Evaluation and survey of state of the art malware detection and classification techniques: Analysis and recommendation}, author={Maniriho, Pascal and Mahmood, Abdun and Chowdhury, Mohammad Jabed Morshed}, journal={Available at SSRN 4197678}, year={2022} } @phdthesis{sindoni2023toward, title={Toward a methodology for malware analysis and characterization for Machine Learning application}, author={Sindoni, Andrea}, year={2023}, school={Politecnico di Torino} } @article{mouro2022tecnicas, title={T{\'e}cnicas de aprendizaje m{\'a}quina para an{\'a}lisis de malware}, author={Mouro Gonz{\'a}lez, Samuel}, year={2022} } @inproceedings{shinde2022knowledge, title={Knowledge Graph creation on Windows malwares and completion using knowledge graph embedding}, author={Shinde, Omkar and Khobragade, Anish}, booktitle={2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)}, pages={1980--1984}, year={2022}, organization={IEEE} } @article{sanz2022uso, title={Uso de algoritmos de machine learning para la detecci{\'o}n de archivos malware}, author={Sanz Garc{\'\i}a, Sergio}, year={2022}, publisher={Universidad Nacional de Educaci{\'o}n a Distancia (Espa{\~n}a). Escuela T{\'e}cnica~…} }