Works matching DE "MALWARE prevention"
Results: 326
Detecting malware communities using socio-cultural cognitive mapping.
- Published in:
- Computational & Mathematical Organization Theory, 2020, v. 26, n. 3, p. 307, doi. 10.1007/s10588-019-09300-w
- By:
- Publication type:
- Article
Bat optimization algorithm for wrapper‐based feature selection and performance improvement of android malware detection.
- Published in:
- IET Networks (Wiley-Blackwell), 2021, v. 10, n. 3, p. 131, doi. 10.1049/ntw2.12022
- By:
- Publication type:
- Article
Got Phished? Internet Security and Human Vulnerability.
- Published in:
- Journal of the Association for Information Systems, 2017, v. 18, n. 1, p. 22
- By:
- Publication type:
- Article
INTELLIGENT METHODS IN CYBER DEFENCE: MACHINE LEARNING BASED PHISHING ATTACK DETECTION ON WEB PAGES.
- Published in:
- SDU Journal of Engineering Sciences & Design / Mühendislik Bilimleri ve Tasarım Dergisi, 2024, v. 12, n. 2, p. 416, doi. 10.21923/jesd.1458955
- By:
- Publication type:
- Article
Cryptography As a Weapon.
- Published in:
- ISSA Journal, 2019, v. 17, n. 5, p. 5
- By:
- Publication type:
- Article
The Race against Cyber Crime Is Lost without Artificial Intelligence.
- Published in:
- ISSA Journal, 2016, v. 14, n. 11, p. 27
- By:
- Publication type:
- Article
The Practice of Malware Protection for Commercial Banking.
- Published in:
- ISSA Journal, 2016, v. 14, n. 4, p. 28
- By:
- Publication type:
- Article
Protecting against Tomorrow's Malware Attacks Today.
- Published in:
- ISSA Journal, 2016, v. 14, n. 4, p. 19
- By:
- Publication type:
- Article
Malware Evolution and the Cyber Talent Gap.
- Published in:
- ISSA Journal, 2016, v. 14, n. 4, p. 9
- By:
- Publication type:
- Article
PROTECTING SENSOR DATA FROM MALWARE ATTACKS.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 178
- By:
- Publication type:
- Article
AUTHENTICATE ONCE AND BE DONE: USER-CENTRIC AUTHENTICATION THROUGH RICH DEVICE CAPABILITIES.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 8
- By:
- Publication type:
- Article
Fuzzy Integral-Based Multi-Classifiers Ensemble for Android Malware Classification.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 22, p. 2880, doi. 10.3390/math9222880
- By:
- Publication type:
- Article
Machine-Learning Classifiers for Malware Detection Using Data Features.
- Published in:
- Journal of ICT Research & Applications, 2021, v. 15, n. 3, p. 265, doi. 10.5614/itbj.ict.res.appl.2021.15.3.5
- By:
- Publication type:
- Article
Security Measures Against Malware Penetration and Spreading.
- Published in:
- TEM Journal, 2013, v. 2, n. 1, p. 83, doi. 10.18421/tem21-12
- By:
- Publication type:
- Article
Malware Classification Based on Shallow Neural Network.
- Published in:
- Future Internet, 2020, v. 12, n. 12, p. 219, doi. 10.3390/fi12120219
- By:
- Publication type:
- Article
PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting †.
- Published in:
- Future Internet, 2020, v. 12, n. 4, p. 66, doi. 10.3390/fi12040066
- By:
- Publication type:
- Article
Improving Forensic Triage Efficiency through Cyber Threat Intelligence.
- Published in:
- Future Internet, 2019, v. 11, n. 7, p. 162, doi. 10.3390/fi11070162
- By:
- Publication type:
- Article
An Efficient Deep Unsupervised Domain Adaptation for Unknown Malware Detection.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 2, p. N.PAG, doi. 10.3390/sym14020296
- By:
- Publication type:
- Article
Two Anatomists Are Better than One—Dual-Level Android Malware Detection.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 7, p. 1128, doi. 10.3390/sym12071128
- By:
- Publication type:
- Article
A Lightweight Android Malware Classifier Using Novel Feature Selection Methods.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 5, p. 858, doi. 10.3390/sym12050858
- By:
- Publication type:
- Article
Malware Classification Using Simhash Encoding and PCA (MCSP).
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 5, p. 830, doi. 10.3390/sym12050830
- By:
- Publication type:
- Article
Strengthening Cloud Computing Security: A Malware Prevention and Detection Framework at the Hypervisor Level.
- Published in:
- Journal of Information Assurance & Security, 2024, v. 19, n. 5, p. 180, doi. 10.2478/ias-2024-0013
- By:
- Publication type:
- Article
Ransomware: A Survey and Trends.
- Published in:
- Journal of Information Assurance & Security, 2017, v. 6, n. 2, p. 48
- By:
- Publication type:
- Article
Analysis and Formal Security Verification of Access Control Schemes in Wireless Sensor Networks: A Critical Survey.
- Published in:
- Journal of Information Assurance & Security, 2013, v. 8, n. 1, p. 33
- By:
- Publication type:
- Article
Correction: Homology analysis of malware based on ensemble learning and multifeatures.
- Published in:
- PLoS ONE, 2019, v. 14, n. 10, p. 1, doi. 10.1371/journal.pone.0223679
- By:
- Publication type:
- Article
Homology analysis of malware based on ensemble learning and multifeatures.
- Published in:
- PLoS ONE, 2019, v. 14, n. 8, p. 1, doi. 10.1371/journal.pone.0211373
- By:
- Publication type:
- Article
A Flattering Robopocalypse: Human Exclusion and the Procedural Rhetoric of Captcha.
- Published in:
- M/C Journal, 2020, v. 23, n. 6, p. N.PAG, doi. 10.5204/mcj.2726
- By:
- Publication type:
- Article
On Fingerprinting of Public Malware Analysis Services.
- Published in:
- Logic Journal of the IGPL, 2020, v. 28, n. 4, p. 473, doi. 10.1093/jigpal/jzz050
- By:
- Publication type:
- Article
Still the fire-proof house? An analysis of Canada's cyber security strategy.
- Published in:
- International Journal, 2011, v. 67, n. 1, p. 155
- By:
- Publication type:
- Article
Analyzing the potential benefits and use cases of ChatGPT as a tool for improving the efficiency and effectiveness of business operations.
- Published in:
- BenchCouncil Transactions on Benchmarks, Standards & Evaluations, 2023, v. 3, n. 3, p. 1, doi. 10.1016/j.tbench.2023.100140
- By:
- Publication type:
- Article
Data Protection Needs a Global Approach.
- Published in:
- International Policy Digest, 2017, v. 4, n. 5, p. 37
- By:
- Publication type:
- Article
Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1668, doi. 10.1007/s11036-019-01503-4
- By:
- Publication type:
- Article
Editorial: Security and Privacy Protection for Mobile Applications and Platforms.
- Published in:
- 2020
- By:
- Publication type:
- Editorial
AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 180, doi. 10.1007/s11036-019-01248-0
- By:
- Publication type:
- Article
An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 1, p. 164, doi. 10.1007/s11036-019-01220-y
- By:
- Publication type:
- Article
Security Through Collaboration and Trust in MANETs.
- Published in:
- Mobile Networks & Applications, 2012, v. 17, n. 3, p. 342, doi. 10.1007/s11036-010-0243-9
- By:
- Publication type:
- Article
Android application behavioural analysis for data leakage.
- Published in:
- Expert Systems, 2021, v. 38, n. 1, p. 1, doi. 10.1111/exsy.12468
- By:
- Publication type:
- Article
MarCHGen: A framework for generating a malware concept hierarchy.
- Published in:
- Expert Systems, 2019, v. 36, n. 5, p. N.PAG, doi. 10.1111/exsy.12445
- By:
- Publication type:
- Article
A novel application of the CORAS framework for ensuring cyber hygiene on shipboard RADAR.
- Published in:
- Journal of Marine Engineering & Technology, 2024, v. 23, n. 2, p. 67, doi. 10.1080/20464177.2023.2292782
- By:
- Publication type:
- Article
Corrigendum to "Combined dynamic multi-feature and rule-based behavior for accurate malware detection".
- Published in:
- 2020
- Publication type:
- Correction Notice
Combined dynamic multi-feature and rule-based behavior for accurate malware detection.
- Published in:
- International Journal of Distributed Sensor Networks, 2019, v. 15, n. 11, p. N.PAG, doi. 10.1177/1550147719889907
- By:
- Publication type:
- Article
AppPerm Analyzer: Malware Detection System Based on Android Permissions and Permission Groups.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2020, v. 30, n. 3, p. 427, doi. 10.1142/S0218194020500175
- By:
- Publication type:
- Article
Optimizing Android Malware Detection Via Ensemble Learning.
- Published in:
- International Journal of Interactive Mobile Technologies, 2020, v. 14, n. 9, p. 61, doi. 10.3991/ijim.v14i09.11548
- By:
- Publication type:
- Article
APT malware static trace analysis through bigrams and graph edit distance.
- Published in:
- Statistical Analysis & Data Mining, 2017, v. 10, n. 3, p. 182, doi. 10.1002/sam.11346
- By:
- Publication type:
- Article
How Bad Guys Are Using The Web's Own Encryption To Hide Malware Payloads.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2016, v. 22, n. 1, p. 8
- By:
- Publication type:
- Article
ELC-PPW: Ensemble Learning and Classification (LC) by Positional Patterns Weights (PPW) of API calls as dynamic n-Grams for Malware Perception.
- Published in:
- International Journal of Simulation: Systems, Science & Technology, 2017, v. 18, n. 1, p. 1, doi. 10.5013/IJSSST.a.18.01.13
- By:
- Publication type:
- Article
Towards a systematic description of the field using bibliometric analysis: malware evolution.
- Published in:
- Scientometrics, 2021, v. 126, n. 3, p. 2013, doi. 10.1007/s11192-020-03834-6
- By:
- Publication type:
- Article
HIGH RELIABILITY IN DIGITAL ORGANIZING: MINDLESSNESS, THE FRAME PROBLEM, AND DIGITAL OPERATIONS.
- Published in:
- MIS Quarterly, 2019, v. 43, n. 2, p. 555, doi. 10.25300/MISQ/2019/14577
- By:
- Publication type:
- Article
WHAT DO SYSTEMS USERS HAVE TO FEAR? USING FEAR APPEALS TO ENGENDER THREATS AND FEAR THAT MOTIVATE PROTECTIVE SECURITY BEHAVIORS.
- Published in:
- MIS Quarterly, 2015, v. 39, n. 4, p. 837
- By:
- Publication type:
- Article
Reconciling Non-malleability with Homomorphic Encryption.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 3, p. 601, doi. 10.1007/s00145-016-9231-y
- By:
- Publication type:
- Article