Showing 1,741 - 1,760 results of 1,786 for search '"malware"', query time: 0.62s Refine Results
  1. 1741
    by Novak, Edmund
    Published 2016
    ... such as mobile malware are already substantial, with over 2500 different types identified in 2010 alone...
    Get full text
    Get full text
    Others
  2. 1742
    by Seminara, Sergio
    Published 2019
    ... modules (SMs), even on devices that are, e.g., malware infected. The target architecture of this thesis...
    Get full text
    Others
  3. 1743
    by Bißmeyer, Norbert
    Published 2014
    ... either extract valid keys and certificates from a communication unit or install a malware on VANET...
    Get full text
    Get full text
    Others
  4. 1744
    by Bachy, Yann
    Published 2015
    ... of malware, capable of targeting any computer device, and more specifically any internet connected device...
    Get full text
  5. 1745
    by Sanjab, Anibal Jean
    Published 2018
    ... as evidenced by the recent discovery of the Stuxnet worm and the Mirai malware, as well as the latest reported...
    Get full text
    Others
  6. 1746
    by Filipiak, Alicia
    Published 2018
    ... is compromised – by a malware for instance. The second protocol is a payment one that has been conceived in order...
    Get full text
  7. 1747
    by HUI-YU CHANG, 張慧宇
    Published 2012
    ...碩士 === 國立臺灣科技大學 === 資訊工程系 === 100 === In the recent years, most malwares have been packed...
    Get full text
    Others
  8. 1748
    by ChiYuan Chuang, 莊啟源
    Published 2005
    ... fingerprints, our system could give a warning to users rapidly if any alter occurred by intruders or malwares...
    Get full text
    Others
  9. 1749
    ... to the description of actual ways of possible distribution of malwares such, as “Easter eggs”, client network...
    Get full text
    Article
  10. 1750
    by Hung-Jen,Chiang, 姜宏仁
    Published 2010
    ... be infected by malwares, they are unknown to continue providing services, and spreading malwares...
    Get full text
    Others
  11. 1751
    by Po-Yu Lin, 林柏宇
    Published 2016
    ...碩士 === 國立中央大學 === 資訊管理學系在職專班 === 105 === In recent years Targeting-Malwares and intrusive attacks...
    Get full text
    Others
  12. 1752
    by Yue-Chi Lee, 李岳奇
    Published 2006
    .... This research focus on how to evaluate the security risk and reducing threats from malwares embedded...
    Get full text
    Others
  13. 1753
    by Qun-kai Su, 蘇群凱
    Published 2011
    ..., photographs, and videos with friends. Malwares called social network worms can send text messages...
    Get full text
    Others
  14. 1754
    by Saman Mirza Abdullah, Bilal Ahmed, Musa Ameen
    Published 2018-06-01
    ... be protected from malicious activities and malwares. Also, many future aspects have been presented....
    Get full text
    Article
  15. 1755
    by Liu, Ruei, 劉叡
    Published 2012
    ... will be important reference to determine whether the suspicious files are malwares or not. ...
    Get full text
    Others
  16. 1756
    by Chi-Hsuan Li, 李奇軒
    Published 2011
    ... and clear malwares, but can not set the victim computers fully back to initial settings. In some situations...
    Get full text
    Others
  17. 1757
    by Chin-Pin Wang, 王清平
    Published 2012
    ... from their clients. For most APT attacks, managers employed antivirus software to detect malwares...
    Get full text
    Others
  18. 1758
    by Murat Oğul, Selçuk Baktır
    Published 2013-09-01
    ... also some IP based threats such as the Denial of Service (DoS) attacks, botnets and malwares...
    Get full text
    Article
  19. 1759
    by Chien-wei Hung, 洪健惟
    Published 2011
    ... for password theft in the world. In this paper, rather than detecting existing malwares or creating a trusted...
    Get full text
    Others
  20. 1760
    by Yao-NienChung, 鍾曜年
    Published 2014
    ... of malicious programs, more and more new variant malwares and guilty tools pop out. To cope with a tremendous...
    Get full text
    Others