Works matching DE "TROJAN horses (Computer viruses)"
Results: 58
Understanding the Influence of Ransomware: An Investigation on its Development, Mitigation and Avoidance Techniques.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 3, p. 123
- By:
- Publication type:
- Article
An exploratory data analysis of malware/ransomware cyberattacks: insights from an extensive cyber loss dataset.
- Published in:
- Enterprise Information Systems, 2024, v. 18, n. 9, p. 1, doi. 10.1080/17517575.2024.2369952
- By:
- Publication type:
- Article
Practitioners' Corner ∙ EU Data Protection Law as a Tool against Discriminatory Outcomes in the context of E-recruitment.
- Published in:
- 2023
- By:
- Publication type:
- Report
Two-step nuclear reactions: The Surrogate Method, the Trojan Horse Method and their common foundations.
- Published in:
- 2017
- By:
- Publication type:
- Letter
BEWARE OF GOVERNMENT AGENTS BEARING TROJAN HORSES.
- Published in:
- Akron Law Review, 2015, v. 48, n. 2, p. 315
- By:
- Publication type:
- Article
A 'Trojan Horse' in the Access to Justice - Party Autonomy and Consumer Arbitration in conflict in the ADR-Directive 2013/11/EU?
- Published in:
- European Review of Contract Law, 2014, v. 10, n. 2, p. 258, doi. 10.1515/ercl-2014-0009
- By:
- Publication type:
- Article
A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 8, p. 1457, doi. 10.3837/tiis.2011.08.006
- By:
- Publication type:
- Article
Multiparty quantum secure direct communication immune to collective noise.
- Published in:
- Quantum Information Processing, 2019, v. 18, n. 1, p. 1, doi. 10.1007/s11128-018-2119-z
- By:
- Publication type:
- Article
Two-party quantum key agreement against collective noise.
- Published in:
- Quantum Information Processing, 2016, v. 15, n. 12, p. 5023, doi. 10.1007/s11128-016-1436-3
- By:
- Publication type:
- Article
Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system.
- Published in:
- Quantum Information Processing, 2016, v. 15, n. 10, p. 4265, doi. 10.1007/s11128-016-1400-2
- By:
- Publication type:
- Article
Quantum dialogue protocols over collective noise using entanglement of GHZ state.
- Published in:
- Quantum Information Processing, 2016, v. 15, n. 7, p. 2971, doi. 10.1007/s11128-016-1309-9
- By:
- Publication type:
- Article
Fault-tolerant authenticated quantum dialogue using logical Bell states.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 9, p. 3499, doi. 10.1007/s11128-015-1040-y
- By:
- Publication type:
- Article
Two-layer quantum key distribution.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 6, p. 2111, doi. 10.1007/s11128-014-0876-x
- By:
- Publication type:
- Article
Trojan-horse attacks on quantum key distribution with classical Bob.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 2, p. 681, doi. 10.1007/s11128-014-0872-1
- By:
- Publication type:
- Article
Trojan horse attack free fault-tolerant quantum key distribution protocols.
- Published in:
- Quantum Information Processing, 2014, v. 13, n. 3, p. 781, doi. 10.1007/s11128-013-0689-3
- By:
- Publication type:
- Article
New quantum private comparison protocol using EPR pairs.
- Published in:
- Quantum Information Processing, 2012, v. 11, n. 2, p. 373, doi. 10.1007/s11128-011-0251-0
- By:
- Publication type:
- Article
Noise‐based logic locking scheme against signal probability skew analysis.
- Published in:
- IET Computers & Digital Techniques (Wiley-Blackwell), 2021, v. 15, n. 4, p. 279, doi. 10.1049/cdt2.12022
- By:
- Publication type:
- Article
Privacy Preservation Using Machine Learning in the Internet of Things.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 16, p. 3477, doi. 10.3390/math11163477
- By:
- Publication type:
- Article
Using deep learning to detect digitally encoded DNA trigger for Trojan malware in Bio-Cyber attacks.
- Published in:
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-13700-5
- By:
- Publication type:
- Article
Human immunodeficiency virus-1 core: The Trojan horse in virus--host interaction.
- Published in:
- Frontiers in Microbiology, 2022, v. 13, p. 1, doi. 10.3389/fmicb.2022.1002476
- By:
- Publication type:
- Article
Automatic analysis of DIFC systems using noninterference with declassification.
- Published in:
- Neural Computing & Applications, 2022, v. 34, n. 12, p. 9385, doi. 10.1007/s00521-021-06334-7
- By:
- Publication type:
- Article
The "Trojan Horse" Approach to Tumor Immunotherapy: Targeting the Tumor Microenvironment.
- Published in:
- Journal of Immunology Research, 2014, p. 1, doi. 10.1155/2014/789069
- By:
- Publication type:
- Article
When plants are Trojan horses for viruses.
- Published in:
- New Phytologist, 2023, v. 237, n. 4, p. 1071, doi. 10.1111/nph.18571
- By:
- Publication type:
- Article
Analysis of Anubis Trojan Attack on Android Banking Application Using Mobile Security Labware.
- Published in:
- International Journal of Safety & Security Engineering, 2023, v. 13, n. 1, p. 31, doi. 10.18280/ijsse.130104
- By:
- Publication type:
- Article
Quasar Remote Access Trojan feature extraction depending on Ethical Hacking.
- Published in:
- Technium, 2022, v. 4, n. 1, p. 68
- By:
- Publication type:
- Article
Malware detection by monitoring host's activities.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 547, doi. 10.3969/j.issn.1001-3695.2014.02.054
- By:
- Publication type:
- Article
Two-party quantum key agreement with five-particle entangled states.
- Published in:
- International Journal of Quantum Information, 2017, v. 15, n. 3, p. -1, doi. 10.1142/S0219749917500186
- By:
- Publication type:
- Article
Two-party quantum key agreement based on four-particle GHZ states.
- Published in:
- International Journal of Quantum Information, 2016, v. 14, n. 1, p. 1, doi. 10.1142/S0219749916500076
- By:
- Publication type:
- Article
Three-party quantum summation without a trusted third party.
- Published in:
- International Journal of Quantum Information, 2015, v. 13, n. 2, p. -1, doi. 10.1142/S0219749915500112
- By:
- Publication type:
- Article
Toward a Taxonomy of Malware Behaviors.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2758, doi. 10.1093/comjnl/bxv047
- By:
- Publication type:
- Article
A Framework for Modelling Trojans and Computer Virus Infection.
- Published in:
- Computer Journal, 1998, v. 41, n. 7, p. 444, doi. 10.1093/comjnl/41.7.444
- By:
- Publication type:
- Article
HB<sup>+</sup>-MHT: Lightweight and Efficient Data Integrity Verification Scheme for Cloud Virtual Machines.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/9473246
- By:
- Publication type:
- Article
Enhancing Cybersecurity Through Live Forensic Investigation of Remote Access Trojan Attacks using FTK Imager Software.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 1, p. 217, doi. 10.18280/ijsse.140121
- By:
- Publication type:
- Article
Ethical Hacking Solution to Defeat Cyber Attacks.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2018, v. 70, n. 2, p. 29
- By:
- Publication type:
- Article
Austrian Constitutional Court: Number Plate Recognition and 'Trojan Horse' Software Are Unconstitutional.
- Published in:
- 2020
- By:
- Publication type:
- Report
Windows 7 Antiforensics: A Review and a Novel Approach.
- Published in:
- Journal of Forensic Sciences, 2017, v. 62, n. 4, p. 1054, doi. 10.1111/1556-4029.13393
- By:
- Publication type:
- Article
Two robust quantum key agreement protocols based on logical GHZ states.
- Published in:
- Modern Physics Letters B, 2017, v. 31, n. 3, p. -1, doi. 10.1142/S0217984917500154
- By:
- Publication type:
- Article
Two-party quantum key agreement protocol with four-particle entangled states.
- Published in:
- Modern Physics Letters B, 2016, v. 30, n. 26, p. -1, doi. 10.1142/S0217984916503322
- By:
- Publication type:
- Article
Proactive Cyber Defense and Reconfigurable Framework for Cyber Security.
- Published in:
- International Review on Computers & Software, 2007, v. 2, n. 2, p. 89
- By:
- Publication type:
- Article
VIRUSES, TROJANS, AND SPYWARE, OH MY! THE YELLOW BRICK ROAD TO COVERAGE IN THE LAND OF INTERNET OZ.
- Published in:
- Tort Trial & Insurance Practice Law Journal, 2014, v. 49, n. 2, p. 529
- By:
- Publication type:
- Article
The Hotel Industry Has a PoS Malware Problem.
- Published in:
- ISSA Journal, 2016, v. 14, n. 4, p. 37
- By:
- Publication type:
- Article
Memes, Trojan horses and the discursive power of audience.
- Published in:
- Human Affairs, 2015, v. 25, n. 2, p. 189, doi. 10.1515/humaff-2015-0017
- By:
- Publication type:
- Article
SOFTWARE FOR COMPUTER SYSTEMS TROJANS DETECTION AS A SAFETY-CASE TOOL.
- Published in:
- Information & Security, 2012, v. 28, n. 1, p. 121, doi. 10.11610/isij.2810
- By:
- Publication type:
- Article
Removal of competing bacteria in coral microbiome through "trojan virus": A newly discovered mechanism of coral pathogenicity.
- Published in:
- SCIENCE CHINA Earth Sciences, 2023, v. 66, n. 8, p. 1906, doi. 10.1007/s11430-023-1146-y
- By:
- Publication type:
- Article
A Trust-Driven Placement Approach: A New Perspective on Design for Hardware Trust.
- Published in:
- Journal of Circuits, Systems & Computers, 2015, v. 24, n. 8, p. -1, doi. 10.1142/S0218126615501157
- By:
- Publication type:
- Article
The Man Who Never Was.
- Published in:
- Strategic Finance, 2007, v. 88, n. 7, p. 64
- Publication type:
- Article
BRIGHT HEADS: FIRE IMAGERY AND INTERTEXTUALITY IN ODYSSEY 18.
- Published in:
- Classical Journal, 2022, v. 118, n. 1, p. 31, doi. 10.1353/tcj.2022.0022
- By:
- Publication type:
- Article
A Large-Scale Study of the Time Required to Compromise a Computer System.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2014, v. 11, n. 1, p. 2, doi. 10.1109/TDSC.2013.21
- By:
- Publication type:
- Article
PUBLIC-PRIVATE PARTNERSHIPS: Relationships true or contrived?
- Published in:
- Public Sector, 2017, v. 40, n. 2, p. 5
- By:
- Publication type:
- Article
Improvement of evidence collection module using live response technology on a windows system.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 16, p. 6453, doi. 10.1007/s11042-014-2098-8
- By:
- Publication type:
- Article