Classification of Malware Images Using Fine-Tunned ViT
Abstract
Keywords
References
- [1] M. Wazid, A. K. Das, J. J. P. C. Rodrigues, S. Shetty, and Y. Park, “IoMT malware detection approaches: analysis and research challenges,” IEEE Access, vol. 7, pp. 182459–182476, 2019.
- [2] A. Chakraborty, A. Biswas, and A. K. Khan, “Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation,” arXiv preprint arXiv:2209.13454, 2022.
- [3] Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions,” Electronics (Basel), vol. 12, no. 6, p. 1333, 2023.
- [4] C. S. Yadav et al., “Malware analysis in iot & android systems with defensive mechanism,” Electronics (Basel), vol. 11, no. 15, p. 2354, 2022.
- [5] M. Z. Hasan, M. Z. Hussain, and Z. Ullah, “Computer Viruses, Attacks, and Security Methods,” Lahore Garrison University Research Journal of Computer Science and Information Technology, vol. 3, no. 3, pp. 20–25, 2019.
- [6] B. S. Rawal, G. Manogaran, and A. Peter, “Malware,” in Cybersecurity and Identity Access Management, Springer, 2022, pp. 103–116.
- [7] P. M. Datta, “Cybersecurity Threats: Malware in the Code,” in Global Technology Management 4.0: Concepts and Cases for Managing in the 4th Industrial Revolution, Springer, 2022, pp. 155–170.
- [8] K. Geldenhuys, “Spyware: Spying on everything you do,” Servamus Community-based Safety and Security Magazine, vol. 114, no. 10, pp. 15–17, 2021.
Details
Primary Language
English
Subjects
Software Engineering (Other)
Journal Section
Research Article
Early Pub Date
April 27, 2024
Publication Date
April 30, 2024
Submission Date
August 10, 2023
Acceptance Date
January 25, 2024
Published in Issue
Year 2024 Volume: 7 Number: 1
Cited By
A Hybrid Deep Learning Approach for Image-based Malware Classification
Firat University Journal of Experimental and Computational Engineering
https://doi.org/10.62520/fujece.1582676
