Suggested Topics within your search.
Suggested Topics within your search.
Malware
17
QA75 Electronic computers. Computer science
12
Machine learning
7
Computer security
6
Cybersecurity
5
Mobile security
5
Android (operating system)
4
History of engineering and technology
4
Malware detection
4
TK Electrical engineering. Electronics Nuclear engineering
4
Classification (of information)
3
Cyber security
3
Data mining
3
Deep learning
3
Feature extraction
3
Malware classifications
3
Malwares
3
QA76 Computer software
3
Technology: general issues
3
malware
3
Android
2
Artificial intelligence
2
Bagging
2
Botnet
2
Data encryption
2
Feature engineerings
2
Information retrieval
2
Information technology industries
2
Learning systems
2
Machine-learning
2
-
141
-
142
-
143“...A malware (such as viruses, ransomware) is the main source of bringing serious security threats...”
Get full text
Article -
144
-
145
-
146“... protection software from accessing effective information to detect malware, this paper proposes a malicious...”
Get full text
Article -
147“... expend increased time and money. One such harmful malware is Mirai, which has created worldwide...”
Get full text
Article -
148
-
149
-
150
-
151
-
152“... to this problem. Many experts researching malwares convert binary-coded malwares into grayscale im- ages...”
Get full text
Others -
153“...碩士 === 國立中央大學 === 資訊管理學系 === 106 === Nowadays, the number of mobile malware is growing faster...”
Get full text
Others -
154“... and more malwares are evolved and can be catalogued (such as Trojans, worms, viruses, adware, etc...”
Get full text
Others -
155“.... In this paper, we provide a mechanism to detect malware, by extracting the Android APK permission application...”
Get full text
Others -
156
-
157
-
158“... software by hackers when they write malware. This paper proposed an approach which is based on reverse...”
Get full text
Others -
159by Yin, Heng“...Malicious software (i.e., malware) has become a severe threat to interconnected computer systems...”
Published 2009
Get full text
Get full text
Others -
160by Kercher, Kellie ElizabethSubjects: “...malware...”
Published 2013
Get full text
Get full text
Others