Search

Your search keyword '"MALWARE prevention"' showing total 1,339 results

Search Constraints

Start Over You searched for: Descriptor "MALWARE prevention" Remove constraint Descriptor: "MALWARE prevention"
1,339 results on '"MALWARE prevention"'

Search Results

1. ESET Home Security Premium: Offers malware prevention, plus excellent level of customization.

2. Securing the Web

3. INTELLIGENT METHODS IN CYBER DEFENCE: MACHINE LEARNING BASED PHISHING ATTACK DETECTION ON WEB PAGES.

4. African Vulture Optimization-Based Decision Tree (AVO-DT): An Innovative Method for Malware Identification and Evaluation through the Application of Meta-Heuristic Optimization Algorithm.

5. Benchmarking Android Malware Analysis Tools.

6. Visualising Static Features and Classifying Android Malware Using a Convolutional Neural Network Approach.

7. A survey on run-time packers and mitigation techniques.

8. A novel application of the CORAS framework for ensuring cyber hygiene on shipboard RADAR.

9. Ransomware malware: Attacks and preventions.

10. Preventing malware propagation in wireless sensor networks: Hybrid optimization algorithm for controlling.

11. Federated malware detection based on many‐objective optimization in cross‐architectural IoT.

12. Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data.

13. Black box malware adversarial examples generation method based on SNGAN.

14. A Kullback-Liebler divergence-based representation algorithm for malware detection.

15. Analyzing the potential benefits and use cases of ChatGPT as a tool for improving the efficiency and effectiveness of business operations.

16. "One question I'm often asked is how secure it is to put all your password eggs in one basket".

17. RealMalSol: real-time optimized model for Android malware detection using efficient neural networks and model quantization.

18. ModDiff: Modularity Similarity-Based Malware Homologation Detection.

19. Machine Learning-Based Adaptive Genetic Algorithm for Android Malware Detection in Auto-Driving Vehicles.

20. A YARA-based approach for detecting cyber security attack types.

21. Image-Based Malware Classification Method with the AlexNet Convolutional Neural Network Model.

22. Broadening The Solution Space of Feature Selection in Time-interval-based Malware Detection.

23. InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems.

24. Human elements impacting risky habits in cybersecurity.

25. SFCWGAN-BiTCN with Sequential Features for Malware Detection.

27. Security Hardened and Privacy Preserved Android Malware Detection Using Fuzzy Hash of Reverse Engineered Source Code.

28. Lightweight On-Device Detection of Android Malware Based on the Koodous Platform and Machine Learning.

29. Where Are We Looking for Security Concerns? Understanding Android Security Static Analysis

30. Malicious URL Detection Using Decision Tree-based Lexical Features Selection and Multilayer Perceptron Model.

31. High Performance Classification of Android Malware Using Ensemble Machine Learning.

32. A Novel Framework for Windows Malware Detection Using a Deep Learning Approach.

33. A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis.

34. Optimal Control of Heterogeneous-Susceptible-Exposed-Infectious-Recovered-Susceptible Malware Propagation Model in Heterogeneous Degree-Based Wireless Sensor Networks.

35. Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration †.

36. Zyxel USG Lite 60AX.

37. Mobile apps give greater financial transactional freedom.

38. Bridgeware: The Air-Gap Malware.

39. MalDC: Malicious Software Detection and Classification using Machine Learning.

40. Prevention of Runtime Malware Injection Attack in Cloud Using Unsupervised Learning.

41. A New Malware Detection Method Based on VMCADR in Cloud Environments.

42. [m]allotROPism: a metamorphic engine for malicious software variation development.

43. AVMCT: API Calls Visualization based Malware Classification using Transfer Learning.

44. A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers.

45. ENERGY EFFICIENT BASED SECURE DATA TRANSMISSION FOR MULTI HOP TRUST MANAGEMENT TECHNIQUE USING WIRELESS SENSOR NETWORK.

46. Machine-Learning Classifiers for Malware Detection Using Data Features.

47. Beware malware.

48. A Survey of Android Malware Detection with Deep Neural Models.

49. A graph-based framework for malicious software detection and classification utilizing temporal-graphs.

50. Machine-Learning-Based Android Malware Family Classification Using Built-In and Custom Permissions.

Catalog

Books, media, physical & digital resources