Search

Your search keyword '"malware"' showing total 5,496 results

Search Constraints

Start Over You searched for: Descriptor "malware" Remove constraint Descriptor: "malware" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
5,496 results on '"malware"'

Search Results

1. Modern ransomware: Evolution, methodology, attack model, prevention and mitigation using multi‐tiered approach.

2. Efficient malware detection through inter-component communication analysis.

4. An Adaptive Framework for Classification and Detection of Android Malware.

5. A DYNAMIC SANDBOX DETECTION TECHNIQUE IN A PRIVATE CLOUD ENVIRONMENT.

6. Image-based Malware Detection and Classification Approach Using Multi-level Deep Learning Methods.

7. Robust malicious software detection and classification using global whale optimization algorithm with deep learning approach.

8. Deep learning-based improved transformer model on android malware detection and classification in internet of vehicles.

9. Static analysis framework for permission-based dataset generation and android malware detection using machine learning.

10. IPAnalyzer: A novel Android malware detection system using ranked Intents and Permissions.

11. Sparse attention with residual pyramidal depthwise separable convolutional based malware detection with optimization mechanism.

12. ViTDroid: Vision Transformers for Efficient, Explainable Attention to Malicious Behavior in Android Binaries.

13. Adaptive Ransomware Detection Using Similarity-Preserving Hashing.

14. Feature selection to improve distributed denial of service detection accuracy using hybrid N-Gram heuristic techniques.

15. Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach.

16. LEDA—Layered Event-Based Malware Detection Architecture.

17. Explaining cybercrime victimization using a longitudinal population-based survey experiment. Are personal characteristics, online routine activities, and actual self-protective online behavior related to future cybercrime victimization?

18. Press play, install malware: a study of rhythm game-based malware dropping.

19. Deep learning vs. adversarial noise: a battle in malware image analysis.

20. MalEXLNet:A semantic analysis and detection method of malware API sequence based on EXLNet model.

21. Keylogger ve Gizlilik: Makine Öğrenimi Modellerinin Karşılaştırması.

22. ScanSavant: Malware Detection for Android Applications with Explainable AI.

23. PermQRDroid: Android malware detection with novel attention layered mini-ResNet architecture over effective permission information image.

24. Enhancing spyware detection by utilizing decision trees with hyperparameter optimization.

25. Hybridized grasshopper optimization and cuckoo search algorithm for the classification of malware.

26. Cyber–Physical Security Assessment for Maritime Vessels: Study on Drillship DP System Using American Petroleum Institute Security Risk Analysis and Bow-Tie Analysis.

27. An Improved Pre-Exploitation Detection Model for Android Malware Attacks.

28. Malware Detection Using Dual Siamese Network Model.

29. Novel Multi-Classification Dynamic Detection Model for Android Malware Based on Improved Zebra Optimization Algorithm and LightGBM.

30. MPSD: A Robust Defense Mechanism against Malicious PowerShell Scripts in Windows Systems.

31. Dual Convolutional Malware Network (DCMN): An Image-Based Malware Classification Using Dual Convolutional Neural Networks.

32. Deep-Learning-Based Approach for IoT Attack and Malware Detection.

33. CAIMP: Cross-Architecture IoT Malware Detection and Prediction Based On Static Feature.

34. Malware Identification Method in Industrial Control Systems Based on Opcode2vec and CVAE-GAN.

35. A Deep Learning Method for the Security Vulnerability Study of Feed-Forward Physical Unclonable Functions.

36. FSSDroid: Feature subset selection for Android malware detection.

37. Cobalt Strike: A Cyber Assessment Challenge.

38. ANFIS-AMAL: Android Malware Threat Assessment Using Ensemble of ANFIS and GWO.

40. Enhancing Linux System Security: A Kernel-Based Approach to Fileless Malware Detection and Mitigation.

41. Going beyond API Calls in Dynamic Malware Analysis: A Novel Dataset.

42. Deep Learning for Cybersecurity Classification: Utilizing Depth-Wise CNN and Attention Mechanism on VM-Obfuscated Data.

43. An exploratory data analysis of malware/ransomware cyberattacks: insights from an extensive cyber loss dataset.

44. TL‐GNN: Android Malware Detection Using Transfer Learning.

45. Implementation of White-Hat Worms Using Mirai Source Code and Its Optimization through Parameter Tuning.

46. Enhanced Android Ransomware Detection Through Hybrid Simultaneous Swarm-Based Optimization.

47. Sparse attention with residual pyramidal depthwise separable convolutional based malware detection with optimization mechanism

48. Exploiting TTPs to Design an Extensible and Explainable Malware Detection System

49. Entropy-extreme model for predicting the development of cyber epidemics at early stages

50. NSDTL: A Robust Malware Detection Framework Under Uncertainty.

Catalog

Books, media, physical & digital resources