Publication:
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction

dc.contributor.authorChimeleze C.U.en_US
dc.contributor.authorJamil N.en_US
dc.contributor.authorIsmail R.en_US
dc.contributor.authorLam K.-Y.en_US
dc.contributor.authorid57222127806en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid15839357700en_US
dc.contributor.authorid7403657062en_US
dc.date.accessioned2023-05-29T09:12:11Z
dc.date.available2023-05-29T09:12:11Z
dc.date.issued2021
dc.descriptionCodes (symbols); Internet of things; Comprehensive assessment; Detection models; Information and Communication Technologies; Information sharing; Internet of thing (IOT); IOT applications; Resourceconstrained devices; Security breaches; Malwareen_US
dc.description.abstractThe Internet of Things (IoT) has been an immediate major turning point in information and communication technology as it gives room for connection and information sharing among numerous devices. Notwithstanding, malicious code attacks have exponentially increased, with malicious code variants ranked as a major threat in resource constrained devices in IoT environment thereby making the efficient malware variants detection a serious concern for researchers in recent years. The capacity to detect malware variants is essential for protection against security breaches, data theft and other dangers. Hence with the explosion of resource constrained devices for IoT applications, it becomes very important to document existing cutting-edge techniques developed to detect malware variants in these devices. In this paper, we have investigated extensively the implementation of malware variants detection models particularly in smartphones as a case study for resource constrained devices. The paper covers the current techniques for detection of malware variants, comprehensive assessment of the techniques and recommendations for future researches. � 2021, Springer Nature Singapore Pte Ltd.en_US
dc.description.natureFinalen_US
dc.identifier.doi10.1007/978-981-33-6835-4_24
dc.identifier.epage370
dc.identifier.scopus2-s2.0-85101498137
dc.identifier.spage354
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85101498137&doi=10.1007%2f978-981-33-6835-4_24&partnerID=40&md5=2eb3fb81e6d4c463ec023ba73fcddb06
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/26573
dc.identifier.volume1347
dc.publisherSpringer Science and Business Media Deutschland GmbHen_US
dc.sourceScopus
dc.sourcetitleCommunications in Computer and Information Science
dc.titleA Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Directionen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
Files
Collections