Suggested Topics within your search.
Suggested Topics within your search.
Malware
17
QA75 Electronic computers. Computer science
12
Machine learning
7
Computer security
6
Cybersecurity
5
Mobile security
5
Android (operating system)
4
History of engineering and technology
4
Malware detection
4
TK Electrical engineering. Electronics Nuclear engineering
4
Classification (of information)
3
Cyber security
3
Data mining
3
Deep learning
3
Feature extraction
3
Malware classifications
3
Malwares
3
QA76 Computer software
3
Technology: general issues
3
malware
3
Android
2
Artificial intelligence
2
Bagging
2
Botnet
2
Data encryption
2
Feature engineerings
2
Information retrieval
2
Information technology industries
2
Learning systems
2
Machine-learning
2
-
1741by Novak, Edmund“... such as mobile malware are already substantial, with over 2500 different types identified in 2010 alone...”
Published 2016
Get full text
Get full text
Others -
1742by Seminara, Sergio“... modules (SMs), even on devices that are, e.g., malware infected. The target architecture of this thesis...”
Published 2019
Get full text
Others -
1743by Bißmeyer, Norbert“... either extract valid keys and certificates from a communication unit or install a malware on VANET...”
Published 2014
Get full text
Get full text
Others -
1744by Bachy, Yann“... of malware, capable of targeting any computer device, and more specifically any internet connected device...”
Published 2015
Get full text
-
1745by Sanjab, Anibal Jean“... as evidenced by the recent discovery of the Stuxnet worm and the Mirai malware, as well as the latest reported...”
Published 2018
Get full text
Others -
1746by Filipiak, Alicia“... is compromised – by a malware for instance. The second protocol is a payment one that has been conceived in order...”
Published 2018
Get full text
-
1747“...碩士 === 國立臺灣科技大學 === 資訊工程系 === 100 === In the recent years, most malwares have been packed...”
Get full text
Others -
1748“... fingerprints, our system could give a warning to users rapidly if any alter occurred by intruders or malwares...”
Get full text
Others -
1749“... to the description of actual ways of possible distribution of malwares such, as “Easter eggs”, client network...”
Get full text
Article -
1750“... be infected by malwares, they are unknown to continue providing services, and spreading malwares...”
Get full text
Others -
1751“...碩士 === 國立中央大學 === 資訊管理學系在職專班 === 105 === In recent years Targeting-Malwares and intrusive attacks...”
Get full text
Others -
1752“.... This research focus on how to evaluate the security risk and reducing threats from malwares embedded...”
Get full text
Others -
1753“..., photographs, and videos with friends. Malwares called social network worms can send text messages...”
Get full text
Others -
1754“... be protected from malicious activities and malwares. Also, many future aspects have been presented....”
Get full text
Article -
1755“... will be important reference to determine whether the suspicious files are malwares or not. ...”
Get full text
Others -
1756“... and clear malwares, but can not set the victim computers fully back to initial settings. In some situations...”
Get full text
Others -
1757“... from their clients. For most APT attacks, managers employed antivirus software to detect malwares...”
Get full text
Others -
1758“... also some IP based threats such as the Denial of Service (DoS) attacks, botnets and malwares...”
Get full text
Article -
1759“... for password theft in the world. In this paper, rather than detecting existing malwares or creating a trusted...”
Get full text
Others -
1760“... of malicious programs, more and more new variant malwares and guilty tools pop out. To cope with a tremendous...”
Get full text
Others