Search

Your search keyword '"malware"' showing total 35,890 results

Search Constraints

Start Over You searched for: Descriptor "malware" Remove constraint Descriptor: "malware"
35,890 results on '"malware"'

Search Results

1. Pitfalls in Machine Learning for Computer Security.

2. Supervised and Unsupervised Learning Techniques for Malware Classification Based on Opcode Frequency Features

5. Unpacking Malware in the Real World: A Step-by Step Guide

7. Malware as a Geopolitical Tool

9. Assessing Static and Dynamic Features for Packing Detection

11. An Optimized Approach Towards Malware Detection Using Java Microservices

12. Understanding and Measuring Inter-process Code Injection in Windows Malware

13. Comparative Analysis of Malware Detection Response Times Across Android Versions: An Emphasis on the 'Hoverwatch' Application

14. Modern ransomware: Evolution, methodology, attack model, prevention and mitigation using multi‐tiered approach.

15. Efficient malware detection through inter-component communication analysis.

17. An Adaptive Framework for Classification and Detection of Android Malware.

18. A DYNAMIC SANDBOX DETECTION TECHNIQUE IN A PRIVATE CLOUD ENVIRONMENT.

19. Image-based Malware Detection and Classification Approach Using Multi-level Deep Learning Methods.

20. Robust malicious software detection and classification using global whale optimization algorithm with deep learning approach.

21. Deep learning-based improved transformer model on android malware detection and classification in internet of vehicles.

22. Static analysis framework for permission-based dataset generation and android malware detection using machine learning.

23. IPAnalyzer: A novel Android malware detection system using ranked Intents and Permissions.

24. Sparse attention with residual pyramidal depthwise separable convolutional based malware detection with optimization mechanism.

25. ViTDroid: Vision Transformers for Efficient, Explainable Attention to Malicious Behavior in Android Binaries.

26. Adaptive Ransomware Detection Using Similarity-Preserving Hashing.

27. Feature selection to improve distributed denial of service detection accuracy using hybrid N-Gram heuristic techniques.

28. Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach.

29. LEDA—Layered Event-Based Malware Detection Architecture.

30. Explaining cybercrime victimization using a longitudinal population-based survey experiment. Are personal characteristics, online routine activities, and actual self-protective online behavior related to future cybercrime victimization?

31. Press play, install malware: a study of rhythm game-based malware dropping.

32. Deep learning vs. adversarial noise: a battle in malware image analysis.

33. MalEXLNet:A semantic analysis and detection method of malware API sequence based on EXLNet model.

34. Keylogger ve Gizlilik: Makine Öğrenimi Modellerinin Karşılaştırması.

35. ScanSavant: Malware Detection for Android Applications with Explainable AI.

36. PermQRDroid: Android malware detection with novel attention layered mini-ResNet architecture over effective permission information image.

37. Enhancing spyware detection by utilizing decision trees with hyperparameter optimization.

38. Hybridized grasshopper optimization and cuckoo search algorithm for the classification of malware.

39. Cyber–Physical Security Assessment for Maritime Vessels: Study on Drillship DP System Using American Petroleum Institute Security Risk Analysis and Bow-Tie Analysis.

40. An Improved Pre-Exploitation Detection Model for Android Malware Attacks.

41. Malware Detection Using Dual Siamese Network Model.

42. Novel Multi-Classification Dynamic Detection Model for Android Malware Based on Improved Zebra Optimization Algorithm and LightGBM.

43. MPSD: A Robust Defense Mechanism against Malicious PowerShell Scripts in Windows Systems.

44. Dual Convolutional Malware Network (DCMN): An Image-Based Malware Classification Using Dual Convolutional Neural Networks.

45. Deep-Learning-Based Approach for IoT Attack and Malware Detection.

46. CAIMP: Cross-Architecture IoT Malware Detection and Prediction Based On Static Feature.

47. Malware Identification Method in Industrial Control Systems Based on Opcode2vec and CVAE-GAN.

48. A Deep Learning Method for the Security Vulnerability Study of Feed-Forward Physical Unclonable Functions.

49. FSSDroid: Feature subset selection for Android malware detection.

50. Cobalt Strike: A Cyber Assessment Challenge.

Catalog

Books, media, physical & digital resources