Search

Your search keyword '"malicious code"' showing total 533 results

Search Constraints

Start Over You searched for: Descriptor "malicious code" Remove constraint Descriptor: "malicious code"
533 results on '"malicious code"'

Search Results

2. MARCO ZERO: AS ORIGENS DA GUERRA CIBERNÉTICA ORQUESTRADA PELOS ESTADOS UNIDOS PARA ATINGIR A REPÚBLICA ISLÂMICA DO IRÃ (2007-2010).

3. Log Poisoning Attacks in IoT: Methodologies, Evasion, Detection, Mitigation, and Criticality Analysis

4. Enhancing Malicious Code Detection With Boosted N-Gram Analysis and Efficient Feature Selection

5. A New Malicious Code Classification Method for the Security of Financial Software.

6. Suppression of Malicious Code Propagation in Software-Defined Networking.

7. Malware Attacks Detection in IoT Using Recurrent Neural Network (RNN).

9. Unsupervised Anomaly Detection Method Based on DNS Log Data

10. Dynamic and Unified Approach to Distinguish Malicious URL Using LSTM

11. Malicious code within model detection method based on model similarity

12. 基于模型相似度的模型恶意代码夹带检测方法.

13. Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical Implementations.

14. Dissecting Applications Uninstallers and Removers: Are They Effective?

15. A Learning-Based Feature Extraction Method for Detecting Malicious Code

17. Machine Learning Capability in the Detection of Malicious Agents

18. Malicious code in the cloud

19. Malicious code dynamic traffic camouflage detection based on deep reinforcement learning in power system

20. Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.

21. Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack.

22. Advances in Cyber Security Paradigm: A Review

23. Research on a Malicious Code Detection Method Based on Convolutional Neural Network in a Domestic Sandbox Environment

24. An ensemble framework for interpretable malicious code detection.

25. An Experimental Approach to Unravel Effects of Malware on System Network Interface

26. Impact Analysis of Resilience Against Malicious Code Attacks via Emails.

27. Framework for Malware Triggering Using Steganography.

28. MALICIOUS CODE IN THE CLOUD.

29. Research on LAN Network Malicious Code Intrusion Active Defense Technology

30. Integrated Multi-featured Android Malicious Code Detection

31. Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments

32. A Comprehensive Survey on Ransomware Attack: A Growing Havoc Cyberthreat

33. Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack

34. On the undetectability of payloads generated through automatic tools: A human‐oriented approach.

35. A Cost-Effective Algorithm for Selecting Optimal Bandwidth to Clear Malicious Codes

37. Framework for Malware Triggering Using Steganography

38. 结合局部优化卯自d的Android恶意家族椅测算法.

40. Research on Malicious Code Analysis Method Based on Semi-supervised Learning

47. Logical Attacks on Secured Containers of the Java Card Platform

48. MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes

50. Varen zagon nepreverjene programske kode v sistemu PIVO.

Catalog

Books, media, physical & digital resources