Search

Your search keyword '"Cryptovirology"' showing total 824 results

Search Constraints

Start Over You searched for: Descriptor "Cryptovirology" Remove constraint Descriptor: "Cryptovirology"
824 results on '"Cryptovirology"'

Search Results

51. Trust-based Voting Method for Efficient Malware Detection

52. Multi-layer Defense Against Malware Attacks on Smartphone Wi-Fi Access Channel

53. Cryptovirology

54. Bringing Kleptography to Real-World TLS

55. A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation

56. Ransomware's Early Mitigation Mechanisms

57. Semantics-Aware Malware Detection

58. Poisoning Behavioral Malware Clustering

59. Androfilter: Android Malware Filter using Valid Market Data

60. A research on detection techniques of Proxy DLL malware disguised as a Windows library : Focus on the case of Winnti

61. Combinatorial detection of malware by IAT discrimination

62. Simple and effective method for detecting abnormal internet behaviors of mobile devices

63. Malware Analysis Mechanism using the Word Cloud based on API Statistics

64. A game of Droid and Mouse: The threat of split-personality malware on Android

65. Smart malware detection on Android

66. Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information

67. Detecting Android Malware Using Clone Detection

68. Prevention Mechanism for Prohibiting SMS Malware Attack on Android Smartphone

69. Malicious web pages: What if hosting providers could actually do something…

70. An efficient block-discriminant identification of packed malware

71. Screening smartphone applications using malware family signatures

72. A Research on Mobile Malware Model propagated Update Attacks

73. Behavior-based features model for malware detection

74. Stealth attacks: An extended insight into the obfuscation effects on Android malware

75. Detecting malware across operating systems

76. AndroSimilar: Robust signature for detecting variants of Android malware

77. One Target Among Many: Not Your Average Malware

78. The Analysis of Android Malware Behaviors

79. Profiling user-trigger dependence for Android malware detection

80. Minimizing the Cost of Malware

81. Kernel k-Means Clustering for Phishing Website and Malware Categorization

82. Testing Android Anti-Malware against Malware Obfuscations

83. Mobile application security: malware threats and defenses

84. AnaDroid: Malware Analysis of Android with User-supplied Predicates

85. Efficient Methods to Trigger Adversarial Behaviors from Malware during Virtual Execution in SandBox

86. A Simple Method for Detection of Metamorphic Malware using Dynamic Analysis and Text Mining

87. Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis

88. A Method and Case Study for Using Malware Analysis to Improve Security Requirements

89. A methodology for the security evaluation within third-party Android Marketplaces

90. Capturing Malware Propagations with Code Injections and Code-Reuse Attacks

91. The impact of malware evolution on the analysis methods and infrastructure

92. Evaluating shallow and deep networks for ransomware detection and classification

93. Learning Android Malware

94. HinDroid

95. A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software

96. Memory forensics using virtual machine introspection for Malware analysis

97. Malware discrimination based on reversed association task

98. Ziffersystem: A novel malware distribution detection system

99. Information flows at OS level unmask sophisticated Android malware

100. Malware Behavior Ontology for Digital Evidence

Catalog

Books, media, physical & digital resources