Showing 1 - 20 results of 1,786 for search '"malware"', query time: 2.02s Refine Results
  1. 1
  2. 2
    by Olowoyeye, Olaboyejo
    Published 2018
    Subjects: ...Malware...
    Get fulltext
    Others
  3. 3
    by Taejin Lee, Jin Kwak
    Published 2016-05-01
    ...Most of the cyber-attacks are caused by malware, and damage from them has escalated from cyber...
    Get full text
    Article
  4. 4
    by Cheng-Hung Peng, 彭証鴻
    Published 2019
    ...碩士 === 國立臺灣大學 === 資訊管理學研究所 === 107 === In recent years, the speed of malware production has grown...
    Get full text
    Others
  5. 5
    by Liu, Chi-Feng, 劉其峰
    Published 2018
    ... software (malware) to steal them. Owing to the success of deep learning on image and language recognition...
    Get full text
    Others
  6. 6
    by Alzarooni, K. M. A.
    Published 2012
    ...Malware programs (e.g., viruses, worms, Trojans, etc.) are a worldwide epidemic. Studies...
    Get full text
  7. 7
    by O'Kane, P. C.
    Published 2014
    ...A cyber war exists between anti-malware researchers and malware writers. At the heart of this war...
    Get full text
  8. 8
    Subjects: ...Malware...
    Get full text
    Others
  9. 9
    by Carlin, Domhnall
    Published 2018
    ...This thesis examines machine learning techniques for detecting malware using dynamic runtime...
    Get full text
  10. 10
    ...Android malware detection is an important research topic in the security area. There are a variety...
    Get full text
    Article
  11. 11
  12. 12
    ...Malware detection done at the network infrastructure level is still an open research problem...
    Get full text
    Article
  13. 13
  14. 14
    by Hung-Yuan Chen, 陳鴻源
    Published 2016
    ..., applications decompilation and modification is not difficult, so it will be targeted by malware easily. Using...
    Get full text
    Others
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
    by Ştefan IOVAN, Ramona MARGE
    Published 2018-05-01
    Subjects: ...device malware...
    Get full text
    Article
  20. 20
    by Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod
    Published 2013-09-01
    ...<p class="Mdeck2authoraffiliation">This paper analyzes different Android malware detection...
    Get full text
    Article