Suggested Topics within your search.
Suggested Topics within your search.
Malware
17
QA75 Electronic computers. Computer science
12
Machine learning
7
Computer security
6
Cybersecurity
5
Mobile security
5
Android (operating system)
4
History of engineering and technology
4
Malware detection
4
TK Electrical engineering. Electronics Nuclear engineering
4
Classification (of information)
3
Cyber security
3
Data mining
3
Deep learning
3
Feature extraction
3
Malware classifications
3
Malwares
3
QA76 Computer software
3
Technology: general issues
3
malware
3
Android
2
Artificial intelligence
2
Bagging
2
Botnet
2
Data encryption
2
Feature engineerings
2
Information retrieval
2
Information technology industries
2
Learning systems
2
Machine-learning
2
-
1701“... typ av malware, vissa nätverkstjänster och några specifika länder var gravt överrepresenterade. ...”
Get full text
Others -
1702by Khiat, Nassima“.... === The Internet and its users are daily the object of attacks of malware. Among them, we can find the worms, which...”
Published 2010
Get full text
-
1703by Nandi, Apurba Kumer“... nowadays. Cyber attacks are carried out both through the spread of malware and also through multi-stage...”
Published 2016
Get full text
Others -
1704by Wan Nur Hidayah Ibrahim, Syahid Anuar, Ali Selamat, Ondrej Krejcar, Ruben Gonzalez Crespo, Enrique Herrera-Viedma, Hamido Fujita“...A botnet is a malware program that a hacker remotely controls called a botmaster. Botnet can...”
Published 2021-01-01
Get full text
Article -
1705by Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Prosanta Gope, Joel J. P. C. Rodrigues“..., malware, man-in-the-middle, malicious routing, and so on). It is then very crucial to protect...”
Published 2021-01-01
Get full text
Article -
1706by Vilc Queupe Rufino, Leandro Pfleger De Aguiar, Daniel Sadoc Menasche, Cabral Lima, Italo Cunha, Eitan Altman, Rachid El-Azouzi, Francesco De Pellegrini, Alberto Avritzer, Michael Grottke“... fraction of the population of devices is immune against a virus or malware. The few individuals who have...”
Published 2020-01-01
Get full text
Article -
1707by Celestine Iwendi, Zunera Jalil, Abdul Rehman Javed, Thippa Reddy G., Rajesh Kaluri, Gautam Srivastava, Ohyun Jo“..., malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also...”
Published 2020-01-01
Get full text
Article -
1708“..., the hacker invaded the Far East Bank's International Remittance Trading System (SWIFT), implanted malware...”
Get full text
Others -
1709by Nunoo, Esi Maan“... of its users increases. This makes it a target for hackers and malware as they can exploit the device...”
Published 2013
Get full text
Others -
1710“... increased. New types of malware used to achieve illegal goals appear regularly. According to experts...”
Get full text
Article -
1711by Abel Yeboah-Ofori, Shareeful Islam, Sin Wee Lee, Zia Ush Shamszaman, Khan Muhammad, Meteb Altaf, Mabrook S. Al-Rakhami“... Forest (RF), and Decision Tree (DT), are used to develop predictive analytics using the Microsoft Malware...”
Published 2021-01-01
Get full text
Article -
1712by Bay Morten“... as a term for protection against malware and hacker attacks. It is often used situationally...”
Published 2016-06-01
Get full text
Article -
1713by Zoe M. King, Diane S. Henshel, Liberty Flora, Mariana G. Cains, Blaine Hoffman, Char Sample, Char Sample“... malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates...”
Published 2018-02-01
Get full text
Article -
1714by Riad, Nancy Ibrahim“... destruction of data by employees, spamming and malware attacks, and employees' sharing of passwords. Moreover...”
Published 2009
Get full text
-
1715by Li, Bo“..., malware detection, network intrusion detection, recommendation systems, etc. In my study, I tailor my...”
Published 2016
Get full text
Others -
1716by Catota Quintana, Frankie“... security, which can enable sophisticated malware attacks; (3) today the level of cybersecurity education...”
Published 2016
Get full text
Get full text
Others -
1717by Younan, Karam“... more than before. And have created mobile-based viruses, malware and spyware that target vulnerable...”
Published 2016
Get full text
Others -
1718by Xu, Kui“...-by download attack, which is one of the major vectors for malware infection. Our tool enforces...”
Published 2014
Get full text
Others -
1719“.... The latest Mirai variant malware is exploiting vulnerabilities of Internet of Things devices. As MUD does...”
Get full text
Article -
1720