Publication: A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction
dc.contributor.author | Chimeleze C.U. | en_US |
dc.contributor.author | Jamil N. | en_US |
dc.contributor.author | Ismail R. | en_US |
dc.contributor.author | Lam K.-Y. | en_US |
dc.contributor.authorid | 57222127806 | en_US |
dc.contributor.authorid | 36682671900 | en_US |
dc.contributor.authorid | 15839357700 | en_US |
dc.contributor.authorid | 7403657062 | en_US |
dc.date.accessioned | 2023-05-29T09:12:11Z | |
dc.date.available | 2023-05-29T09:12:11Z | |
dc.date.issued | 2021 | |
dc.description | Codes (symbols); Internet of things; Comprehensive assessment; Detection models; Information and Communication Technologies; Information sharing; Internet of thing (IOT); IOT applications; Resourceconstrained devices; Security breaches; Malware | en_US |
dc.description.abstract | The Internet of Things (IoT) has been an immediate major turning point in information and communication technology as it gives room for connection and information sharing among numerous devices. Notwithstanding, malicious code attacks have exponentially increased, with malicious code variants ranked as a major threat in resource constrained devices in IoT environment thereby making the efficient malware variants detection a serious concern for researchers in recent years. The capacity to detect malware variants is essential for protection against security breaches, data theft and other dangers. Hence with the explosion of resource constrained devices for IoT applications, it becomes very important to document existing cutting-edge techniques developed to detect malware variants in these devices. In this paper, we have investigated extensively the implementation of malware variants detection models particularly in smartphones as a case study for resource constrained devices. The paper covers the current techniques for detection of malware variants, comprehensive assessment of the techniques and recommendations for future researches. � 2021, Springer Nature Singapore Pte Ltd. | en_US |
dc.description.nature | Final | en_US |
dc.identifier.doi | 10.1007/978-981-33-6835-4_24 | |
dc.identifier.epage | 370 | |
dc.identifier.scopus | 2-s2.0-85101498137 | |
dc.identifier.spage | 354 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85101498137&doi=10.1007%2f978-981-33-6835-4_24&partnerID=40&md5=2eb3fb81e6d4c463ec023ba73fcddb06 | |
dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/26573 | |
dc.identifier.volume | 1347 | |
dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
dc.source | Scopus | |
dc.sourcetitle | Communications in Computer and Information Science | |
dc.title | A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction | en_US |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |