134 results on '"Spyware -- Analysis"'
Search Results
2. Advisory for Stockbroker - Member onboarding for CERT-In Cyber Swachhta Kendra (CSK)
3. Recent Studies from Department of Computer Engineering Add New Data to Information Technology (Lam: Scrutinizing Leading Apis for Detecting Suspicious Call Sequences)
4. Findings in Information Technology Reported from Virginia Polytechnic Institute and State University (Virginia Tech) (Deep hybrid approach with sequential feature extraction and classification for robust malware detection)
5. Free Malware Research with ANY.RUN Sandbox: Now Windows 10 Access for All Users
6. New Information Technology Data Have Been Reported by Investigators at Xinjiang University (Efficient Malware Detection Through Inter-component Communication Analysis)
7. Studies from Aalborg University Update Current Data on Engineering (Redefining Malware Sandboxing: Enhancing Analysis Through Sysmon and ELK Integration)
8. HiddenLayer Collaborates with Microsoft Azure AI to Enhance Model Security
9. WatchGuard Threat Lab Analysis Shows Surge in Evasive Malware Supercharging an Already Powerful Threat Wave
10. Cyber Ad-versaries Using Analytics to Measure 'Victims per Click'
11. Cyber Ad-versaries Using Analytics to Measure 'Victims per Click' HP warns of rise in malicious PDF campaigns and Office exploits, while noting Office macros persist
12. USING AI TO DEVELOP ENHANCED CYBERSECURITY MEASURES
13. Bangladesh University of Engineering and Technology (BUET) Researchers Update Current Data on Machine Learning (Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity)
14. Recent Findings from Soongsil University Has Provided New Information about Information Technology (An Empirical Study On the Effectiveness of Adversarial Examples In Malware Detection)
15. Navigating the Terrain: GPT's Journey into Malware Analysis
16. Building General Knowledge of Mechanisms in Information Security
17. Malware Spotlight: Camaro Dragon's TinyNote Backdoor
18. Renewal Of The Information And Communication Infrastructure Of The Agency For Geodesy, Cartography And Cadastre
19. Navigating the Terrain: GPT's Journey into Malware Analysis
20. University of New Brunswick Researcher Reports on Findings in Information Technology (Identifying Malware Packers through Multilayer Feature Engineering in Static Analysis)
21. Study Findings on Information Technology Discussed by a Researcher at Babes-Bolyai University (Malware Analysis and Static Call Graph Generation with Radare2)
22. Protect AI Introduces Guardian
23. Research from Ewha Womans University Yields New Data on Sensor Research (Evaluation of Malware Classification Models for Heterogeneous Data)
24. Studies in the Area of Information Technology Reported from Zhejiang University of Technology (Ctimd: Cyber Threat Intelligence Enhanced Malware Detection Using Api Call Sequences With Parameters)
25. New Computer Science Research Reported from Institute of Technical Education and Research (An ensemble approach for imbalanced multiclass malware classification using 1D-CNN)
26. Initial security analysis of ChatGPT4 finds scenarios for accelerated cybercrime
27. Malware Spotlight: Camaro Dragon's TinyNote Backdoor
28. New Research on Computer Science from Army Engineering University of PLA Summarized (Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection)
29. Recent Findings in Information Technology Described by Researchers from Friedrich-Alexander-University Erlangen-Nurnberg (FAU) [Windows Memory Forensics: Identification of (Malicious) Modifications In Memory-mapped Image Files]
30. Supply Of Malware Analysis Sandbox (q3) Qty : 1
31. Initial security analysis of ChatGPT4 finds scenarios for accelerated cybercrime
32. Microsoft warns of new Minecraft DDoS malware infecting Windows, Linux
33. Archive files '.ZIP past' Office docs as most common malicious file type for the first time
34. Findings from University of Portsmouth Yields New Findings on Applied Sciences (Image-based Malware Detection Using Alpha-cuts and Binary Visualisation)
35. Studies from King Khalid University Reveal New Findings on Machine Learning (Malware API Calls Detection Using Hybrid Logistic Regression and RNN Model)
36. Wichita State University secures contract for Satc: Core: Small: Automated Dynamic Analysis For Smart Device Malware Hiding Mechanisms
37. OPSWAT Presents New Malware Analysis Capabilities for Operational Technology (OT) at Black Hat USA 2022
38. OPSWAT Presents New Malware Analysis Capabilities for Operational Technology (OT) at Black Hat USA 2022
39. Nanjing University of Information Science and Technology (NUIST) Researchers Provide New Insights into Data Systems (Efficient Windows malware identification and classification scheme for plant protection information systems)
40. New Information Technology Study Findings Have Been Reported by Researchers at Huazhong University of Science and Technology (Multimodal Information Fusion for Android Malware Detection Using Lazy Learning)
41. New Findings from University of Luxembourg in the Area of Information Technology Reported [On the (In)Effectiveness of Static Logic Bomb Detection for Android Apps]
42. VMRay Unveils Advanced Machine Learning Capabilities to Accelerate Threat Detection and Analysis
43. Studies from Lanzhou University of Technology Add New Findings in the Area of Machine Learning (Malware Analysis and Detection Using Machine Learning Algorithms)
44. Gazi University Researchers Provide New Data on Machine Learning (Malware Detection Using Memory Analysis Data in Big Data Environment)
45. 29% of Cyber Threats Previously Unknown, HP Research Finds
46. Studies from Lomonosov Moscow State University in the Area of Machine Learning Published (Detection of Malicious Activity in Encrypted Traffic Presented as a Time Series)
47. Zhejiang A&F University Researchers Detail New Studies and Findings in the Area of Computer Science (Disassemble Byte Sequence Using Graph Attention Network)
48. New Information Technology Study Findings Reported from Beijing Institute of Technology (A Novel Approach Based On Adaptive Online Analysis of Encrypted Traffic for Identifying Malware In Iiot)
49. Reports from State Key Laboratory of Mathematical Engineering and Advanced Computing Highlight Recent Findings in Information Technology (Demal: Module Decomposition of Malware Based On Community Discovery)
50. Findings from University of Ilorin in Applied Sciences Reported (Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection)
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.