Search

Your search keyword '"malware"' showing total 4,541 results

Search Constraints

Start Over You searched for: Descriptor "malware" Remove constraint Descriptor: "malware" Publisher ieee Remove constraint Publisher: ieee
4,541 results on '"malware"'

Search Results

1. Cyberattacks on Energy Infrastructures as Modern War Weapons—Part I: Analysis and Motives.

2. A Holistic Intelligent Cryptojacking Malware Detection System

3. DeepImageDroid: A Hybrid Framework Leveraging Visual Transformers and Convolutional Neural Networks for Robust Android Malware Detection

4. Advanced Machine Learning Based Malware Detection Systems

5. Enhancing Malicious URL Detection: A Novel Framework Leveraging Priority Coefficient and Feature Evaluation

6. Malware Detection With Subspace Learning-Based One-Class Classification

7. MalSSL—Self-Supervised Learning for Accurate and Label-Efficient Malware Classification

8. A Survey on Hardware-Based Malware Detection Approaches

9. Design and Performance Analysis of an Anti-Malware System Based on Generative Adversarial Network Framework

10. Unveiling the Connection Between Malware and Pirated Software in Southeast Asian Countries: A Case Study

11. Obfuscated Privacy Malware Classifiers Based on Memory Dumping Analysis

12. Human Centricity in the Relationship Between Explainability and Trust in AI.

13. MDHE: A Malware Detection System Based on Trust Hybrid User-Edge Evaluation in IoT Network.

14. XMD: An Expansive Hardware-Telemetry-Based Mobile Malware Detector for Endpoint Detection.

15. DOLOS: A Novel Architecture for Moving Target Defense.

16. Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things.

17. Obfuscation-Resilient Android Malware Analysis Based on Complementary Features.

18. CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection.

19. Disarming Attacks Inside Neural Network Models

20. A Malware Detection Approach Based on Feature Engineering and Behavior Analysis

21. Efficient Malware Analysis Using Subspace-Based Methods on Representative Image Patterns

22. ACMFNN: A Novel Design of an Augmented Convolutional Model for Intelligent Cross-Domain Malware Localization via Forensic Neural Networks

23. System API Vectorization for Malware Detection

24. Content Disarm and Reconstruction of PDF Files

25. Malware Threat on Edge/Fog Computing Environments From Internet of Things Devices Perspective

26. A Novel Machine Learning Approach for Android Malware Detection Based on the Co-Existence of Features

27. Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning.

29. Adversarial ELF Malware Detection Method Using Model Interpretation.

30. Mitigating Malicious Adversaries Evasion Attacks in Industrial Internet of Things.

31. Hardware-Assisted Malware Detection and Localization Using Explainable Machine Learning.

32. A Hybrid Deep Network Framework for Android Malware Detection.

33. IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection.

34. Blockchain-Based Trusted Traffic Offloading in Space-Air-Ground Integrated Networks (SAGIN): A Federated Reinforcement Learning Approach.

35. Overlay-Based Android Malware Detection at Market Scales: Systematically Adapting to the New Technological Landscape.

36. Android Ransomware Detection From Traffic Analysis Using Metaheuristic Feature Selection

37. HMLET: Hunt Malware Using Wavelet Transform on Cross-Platform

38. A Method for Automatic Android Malware Detection Based on Static Analysis and Deep Learning

39. PAIRED: An Explainable Lightweight Android Malware Detection System

40. Smishing Strategy Dynamics and Evolving Botnet Activities in Japan

41. Design and Emulation of Physics-Centric Cyberattacks on an Electrical Power Transformer

42. Summary of DNS Over HTTPS Abuse

43. Lightweight, Effective Detection and Characterization of Mobile Malware Families.

44. Efficient Hardware Malware Detectors That are Resilient to Adversarial Evasion.

45. MIDAS: Safeguarding IoT Devices Against Malware via Real-Time Behavior Auditing.

46. Explainable Machine Learning for Intrusion Detection via Hardware Performance Counters.

47. A Secure Network Model Against Bot Attacks in Edge-Enabled Industrial Internet of Things.

48. An Advanced Computing Approach for IoT-Botnet Detection in Industrial Internet of Things.

49. RvDfi: A RISC-V Architecture With Security Enforcement by High Performance Complete Data-Flow Integrity.

50. Hardware Immune System for Embedded IoT.

Catalog

Books, media, physical & digital resources