Showing 1,701 - 1,720 results of 1,786 for search '"malware"', query time: 5.47s Refine Results
  1. 1701
    by Mynarski, Pawel, Carlsson, Oscar
    Published 2012
    ... typ av malware, vissa nätverkstjänster och några specifika länder var gravt överrepresenterade. ...
    Get full text
    Others
  2. 1702
    by Khiat, Nassima
    Published 2010
    .... === The Internet and its users are daily the object of attacks of malware. Among them, we can find the worms, which...
    Get full text
  3. 1703
    by Nandi, Apurba Kumer
    Published 2016
    ... nowadays. Cyber attacks are carried out both through the spread of malware and also through multi-stage...
    Get full text
    Others
  4. 1704
    ...A botnet is a malware program that a hacker remotely controls called a botmaster. Botnet can...
    Get full text
    Article
  5. 1705
    ..., malware, man-in-the-middle, malicious routing, and so on). It is then very crucial to protect...
    Get full text
    Article
  6. 1706
    ... fraction of the population of devices is immune against a virus or malware. The few individuals who have...
    Get full text
    Article
  7. 1707
    ..., malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also...
    Get full text
    Article
  8. 1708
    by YANG, HUI-JU, 楊慧茹
    Published 2019
    ..., the hacker invaded the Far East Bank's International Remittance Trading System (SWIFT), implanted malware...
    Get full text
    Others
  9. 1709
    by Nunoo, Esi Maan
    Published 2013
    ... of its users increases. This makes it a target for hackers and malware as they can exploit the device...
    Get full text
    Others
  10. 1710
    by A. A. Danelyan, E. E. Gulyaeva
    Published 2020-07-01
    ... increased. New types of malware used to achieve illegal goals appear regularly. According to experts...
    Get full text
    Article
  11. 1711
    ... Forest (RF), and Decision Tree (DT), are used to develop predictive analytics using the Microsoft Malware...
    Get full text
    Article
  12. 1712
    by Bay Morten
    Published 2016-06-01
    ... as a term for protection against malware and hacker attacks. It is often used situationally...
    Get full text
    Article
  13. 1713
    ... malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates...
    Get full text
    Article
  14. 1714
    by Riad, Nancy Ibrahim
    Published 2009
    ... destruction of data by employees, spamming and malware attacks, and employees' sharing of passwords. Moreover...
    Get full text
  15. 1715
    by Li, Bo
    Published 2016
    ..., malware detection, network intrusion detection, recommendation systems, etc. In my study, I tailor my...
    Get full text
    Others
  16. 1716
    by Catota Quintana, Frankie
    Published 2016
    ... security, which can enable sophisticated malware attacks; (3) today the level of cybersecurity education...
    Get full text
    Get full text
    Others
  17. 1717
    by Younan, Karam
    Published 2016
    ... more than before. And have created mobile-based viruses, malware and spyware that target vulnerable...
    Get full text
    Others
  18. 1718
    by Xu, Kui
    Published 2014
    ...-by download attack, which is one of the major vectors for malware infection. Our tool enforces...
    Get full text
    Others
  19. 1719
    .... The latest Mirai variant malware is exploiting vulnerabilities of Internet of Things devices. As MUD does...
    Get full text
    Article
  20. 1720