Search

Your search keyword '"MALWARE prevention"' showing total 1,339 results

Search Constraints

Start Over You searched for: Descriptor "MALWARE prevention" Remove constraint Descriptor: "MALWARE prevention"
1,339 results on '"MALWARE prevention"'

Search Results

201. An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices.

202. A study of IoT malware activities using association rule learning for darknet sensor data.

203. A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information.

204. Android Malware Detection through Machine Learning Techniques: A Review.

205. Android Malware Detection Using Fine-Grained Features.

206. Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms.

207. White-Hat Worm to Fight Malware and Its Evaluation by Agent-Oriented Petri Nets.

208. Deep learning for effective Android malware detection using API call graph embeddings.

209. A Novel Framework to Classify Malware in MIPS Architecture-Based IoT Devices.

210. SensDroid: Analysis for Malicious Activity Risk of Android Application.

211. Hydras and IPFS: a decentralised playground for malware.

212. MoG: Behavior-Obfuscation Resistance Malware Detection.

213. Fast k-NN based Malware Analysis in a Massive Malware Environment.

214. Android Malware Detection via Graphlet Sampling.

216. Malware Analysis on Mobile Phone.

217. Current Technologies and Trends in Cybersecurity and the Impact of Artificial Intelligence.

218. Information Security For Hospital Information System Using Cobit 5 Framework.

219. MODEL AND QUANTITATIVE ASSESSMENT OF THE EFFECTIVENESS OF EXISTING METHODS OF PROTECTION AGAINST MALWARE.

220. Towards Intelligible Robust Anomaly Detection by Learning Interpretable Behavioural Models.

221. Privacy and Security Cryptovirology: The Birth, Neglect, and Explosion of Ransomware: Recent attacks exploiting a known vulnerability continue a downward spiral of ransomware-related incidents.

222. ASK: TECH SUPPORT & TECHSPLANATIONS.

223. Detecting malware capabilities with FOSS: lessons learned through a real-life incident.

224. Secure Cloud Computing

225. Decision-Making Method for Estimating Malware Risk Index.

226. Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD.

227. Research on data mining of permissions mode for Android malware detection.

228. A multi-level deep learning system for malware detection.

229. Android Malware Family Classification Based on Deep Learning of Code Images.

230. 비정형 Security Intelligence Report의 정형 정보 자동 추출.

231. Unexpected-Behavior Detection Using TopK Rankings for Cybersecurity.

232. DGA Domain Name Classification Method Based on Long Short-Term Memory with Attention Mechanism.

233. All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis.

234. 一种基于元信息的 Android 恶意软件检测方法.

235. Identification of Network Intrusion in Network Security by Enabling Antidote Selection.

236. The Implementation of Deep Neural Networks Algorithm for Malware Classification.

237. NATO Human View Executable Architectures for Critical Infrastructure Analysis.

238. Comprehensive review and analysis of anti-malware apps for smartphones.

239. Malware Detection Approach Based on Artifacts in Memory Image and Dynamic Analysis.

240. A Cloud-Based Real-Time Mechanism to Protect End Hosts against Malware.

241. THE V-NETWORK: A TESTBED FOR MALWARE ANALYSIS.

242. Type Learning for Binaries and Its Applications.

243. Intrusion Detection System for Home Windows based Computers.

244. VIRTUAL SYSTEM OBFUSCATION.

245. Homology analysis of malware based on ensemble learning and multifeatures.

246. Entropy-based security risk measurement for Android mobile applications.

247. Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization.

248. HLMD: a signature-based approach to hardware-level behavioral malware detection and classification.

249. Pre-filters in-transit malware packets detection in the network.

250. The Android OS stack and its vulnerabilities: an empirical study.

Catalog

Books, media, physical & digital resources