ISSN: 1683-3198
|
e-ISSN: 2309-4524
|
DOI: 10.34028/iajit
Submit your Paper
Track your Paper
The International Arab Journal of Information Technology
(IAJIT)
Home
Aims and Scopes
About IAJIT
Current Issue
Archives
Submission
Indexing
Announcement
Contact Us
Home
/
Search for: Malware
Editorial Board
Technical Committee
Instruction to Authors
Article Processing Charges
Submit your Paper
Track your Paper
Instructions to Reviewers
Review Paper
Statistics
Malware Detection through Memory Forensics and Windows Event Log Analysis
Dinesh Patil,Akshaya Prabhu
#Malware
#windows event logs
#code section
#main memory analysis
#main memory structures
#VAD
#volatile memory
RoboGuard: Enhancing Robotic System Security with Ensemble Learning
Ali Al Maqousi,Mohammad Alauthman
#Robotic systems
#cybersecurity
#malware detection
#machine learning
#ensemble learning
#synthetic minority over-sampling technique
A Method of Extracting Malware Features Based on Gini Impurity Increment and Improved TF-IDF
Shimiao Sun,Yashu Liu
#Gini impurity increment
#TF-IDF
#feature selection
#dimensionality reduction
On Detection and Prevention of Zero-Day Attack
Using Cuckoo Sandbox in Software-Defined
#Zero-day attack
# Malwares
# Controller
# Intrusion Detection System
# Cuckoo Sandbox
# Software-Defined Networks
Enhanced Android Malware Detection and Family Classification, using Conversation-level Network
Traffic Features
#Information Security
# Android Malware
# Network Traffic Analysis
# Conversation-level Features
# and Machine Learning
Mining Android Bytecodes through the Eyes of Gabor Filters for Detecting Malware
Shahid Alam,Alper Kamil Demir
#Android bytecode
#malware analysis and detection
#sliding window
#gabor filters
#gabor features
#machine learning
An Improved Process Supervision and Control Method for Malware Detection
Behnam Shamshirsaz, Seyyed Amir Asghari, Mohammadreza Binesh Marvasti
#Mid-level code
# malware detection
# process supervision
# microsoft windows
# anti-virus
# endpoint detection and response
Multichannel Based IoT Malware Detection System Using System Calls and Opcode Sequences
Shobana Manoharan,Poonkuzhali Sugumaran,Kishore Kumar
#System calls
#IoT malwares
#fog computing
#RNN
#CNN
#multichannel CNN
All Rights reserved to IAJIT 2025
Powered by:
TurnPoint