Search

Your search keyword '"malware"' showing total 34,829 results

Search Constraints

Start Over You searched for: Descriptor "malware" Remove constraint Descriptor: "malware"
34,829 results on '"malware"'

Search Results

201. malC: A Novel Deep Learning Architecture for Malware Classification

204. Collaboration of Intelligent Systems to Improve Information Security

205. Detecting IoT Malware Using Federated Learning

207. Analyzing and Detecting Malware Using Machine Learning and Deep Learning

208. Using Page Offsets for Detecting Control-Flow Anomalies

209. Study of Cyber Threats in IoT Systems

211. Android Malware Detection Using Artificial Intelligence

212. Benchmark: Neural Network Malware Classification

213. Machine Learning Techniques for Cyber Security: A Review

220. Comparative Study of the Effect of Datasets and Machine Learning Algorithms for PDF Malware Detection

221. EXPERT ADVICE.

222. ASK.

223. 7 ANTIVIRUS MYTHS THAT ARE DEAD WRONG.

224. Cyber epidemic spread forecasting based on the entropy-extremal dynamic interpretation of the SIR model

225. Investigation of cyber attacks using post-installation app detection method

226. Variance of the Infection Number of Heterogeneous Malware Spread in Network.

227. PermDroid a framework developed using proposed feature selection approach and machine learning techniques for Android malware detection.

228. Malware traffic detection based on type II fuzzy recognition.

229. Multi-variants vision transformer-based malware image classification model using multi-criteria decision-making.

230. Backdoor Attacks Prediction in IIoT Network using Optimal Double Mask Region Convolution Model.

231. IPAttributor: Cyber Attacker Attribution with Threat Intelligence-Enriched Intrusion Data.

232. Towards a semi-automatic classifier of malware through tweets for early warning threat detection.

233. Modern Mobile Malware Detection Framework Using Machine Learning and Random Forest Algorithm.

234. Optimizing android program malware classification using GridSearchCV optimized random forest.

235. Artificial Intelligence-Driven Penetration Testing for Wireless Networks: Enhancing Security Vulnerability Detection Using CNN Models.

236. Perception of the risks inherent in new AI technologies.

237. Use case generation, variation, and anticipation in innovation projects: Analysis of current industry practices based on interviews with international innovation experts.

238. Misuse of large language models: Exploiting weaknesses for target-specific outputs.

239. A Comprehensive Review of Machine Learning Approaches for Detecting Malicious Software.

240. A New Approach of Botnet Activity Detection Models Using Combination of Univariate and ANOVA Feature Selection Techniques.

241. Feature Selection Using Adaptive Weight Based Grey Wolf Optimization for Malware Detection in Android.

242. Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection.

243. An Empirical Study on Detection of Android Adware Using Machine Learning Techniques.

244. GSB: GNGS and SAG-BiGRU network for malware dynamic detection.

245. Can Windows 11 Stop Well-Known Ransomware Variants? An Examination of Its Built-in Security Features.

246. Effective and Efficient Android Malware Detection and Category Classification Using the Enhanced KronoDroid Dataset.

247. Cyber threats to the Private Academic Cloud.

248. Empirical analysis of the cyberattacks of the Russian–Ukrainian war.

249. Provisioning the external infrastructure for Cyberspace Operations. A spotlight on Russian APT groups.

250. Malware detection for container runtime based on virtual machine introspection.

Catalog

Books, media, physical & digital resources