Works matching DE "ANTI-malware (Computer software)"
Results: 70
Staying Safe Online: A Guide to Cyber Security.
- Published in:
- British Dental Nurses Journal, 2025, v. 88, n. 1, p. 28
- Publication type:
- Article
Bat optimization algorithm for wrapper‐based feature selection and performance improvement of android malware detection.
- Published in:
- IET Networks (Wiley-Blackwell), 2021, v. 10, n. 3, p. 131, doi. 10.1049/ntw2.12022
- By:
- Publication type:
- Article
The Security Architect and the Security Engineer.
- Published in:
- ISSA Journal, 2016, v. 14, n. 12, p. 7
- By:
- Publication type:
- Article
Infection.
- Published in:
- ISSA Journal, 2016, v. 14, n. 4, p. 6
- By:
- Publication type:
- Article
Machine-Learning Classifiers for Malware Detection Using Data Features.
- Published in:
- Journal of ICT Research & Applications, 2021, v. 15, n. 3, p. 265, doi. 10.5614/itbj.ict.res.appl.2021.15.3.5
- By:
- Publication type:
- Article
Security Measures Against Malware Penetration and Spreading.
- Published in:
- TEM Journal, 2013, v. 2, n. 1, p. 83, doi. 10.18421/tem21-12
- By:
- Publication type:
- Article
A Comparative Experimental Evaluation of the Detection Rates and Removal Abilities of Fifteen Malware Detector Tools on Xpaj.MBR Rootkit.
- Published in:
- African Journal of Computing & ICT, 2020, v. 13, n. 3, p. 42
- By:
- Publication type:
- Article
Annotated Control Flow Graph for Metamorphic Malware Detection.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2608, doi. 10.1093/comjnl/bxu148
- By:
- Publication type:
- Article
The Author Responds.
- Published in:
- 2017
- By:
- Publication type:
- Letter to the Editor
Android ransomware detection using binary Jaya optimization algorithm.
- Published in:
- Expert Systems, 2024, v. 41, n. 1, p. 1, doi. 10.1111/exsy.13479
- By:
- Publication type:
- Article
Hybridized Least Absolute Shrinkage Selection Operator and Cross-Validation Algorithm for Classification of Malware.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2023, v. 16, n. 5, p. 329, doi. 10.22266/ijies2023.1031.28
- By:
- Publication type:
- Article
Apple secretly updates malware protection for Mac computers.
- Published in:
- British Journal of Healthcare Computing & Information Management, 2010, p. 21
- Publication type:
- Article
Falling for an email phishing scam at the office.
- Published in:
- Optometry Times, 2015, v. 7, n. 10, p. 20
- By:
- Publication type:
- Article
STOP - THINK - CONNECT: Preventing Ransomware Attacks.
- Published in:
- Michigan Medicine, 2016, v. 115, n. 3, p. 12
- By:
- Publication type:
- Article
Friend or Foe?
- Published in:
- Internal Auditor, 2010, v. 67, n. 1, p. 22
- Publication type:
- Article
Comparison of Anti-Virus Programs using Fuzzy Logic.
- Published in:
- Journal of Systems Integration (1804-2724), 2013, v. 4, n. 3, p. 48
- By:
- Publication type:
- Article
IoT based Smart Transportation System: Implementation and Security Challenges.
- Published in:
- International Journal of Vehicle Structures & Systems (IJVSS), 2022, v. 14, n. 5, p. 567, doi. 10.4273/ijvss.14.5.03
- By:
- Publication type:
- Article
Exploring the Dynamics of a Malware Propagation Model and Its Control Strategy.
- Published in:
- Wireless Personal Communications, 2021, v. 121, n. 3, p. 1945, doi. 10.1007/s11277-021-08748-x
- By:
- Publication type:
- Article
Using G Features to Improve the Efficiency of Function Call Graph Based Android Malware Detection.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 2947, doi. 10.1007/s11277-018-5982-0
- By:
- Publication type:
- Article
Secure The Attachment: Best Practices and Other Tips for Email Attachments.
- Published in:
- Utah Bar Journal, 2019, v. 32, n. 1, p. 47
- By:
- Publication type:
- Article
Stronger public key encryption system withstanding RAM scraper like attacks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 12, p. 1650, doi. 10.1002/sec.1454
- By:
- Publication type:
- Article
Design and implementation of a malware detection system based on network behavior.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 3, p. 459, doi. 10.1002/sec.993
- By:
- Publication type:
- Article
What you see predicts what you get-lightweight agent-based malware detection.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 1, p. 33, doi. 10.1002/sec.528
- By:
- Publication type:
- Article
ANDROID MALWARE DETECTION USING HAML.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 9, p. 14, doi. 10.26483/ijarcs.v8i9.4781
- By:
- Publication type:
- Article
The Best Antivirus, Antimalware Solution for Home Owners And Corporates.
- Published in:
- International Journal of Advanced Research in Computer Science, 2015, v. 6, n. 7, p. 26
- By:
- Publication type:
- Article
Four Foreign Forces: A CTI Analysis of APTs Targeting the U.S.
- Published in:
- Journal of Information Warfare, 2024, v. 23, n. 4, p. 1
- By:
- Publication type:
- Article
IoT Malware Detection Based on OPCODE Purification.
- Published in:
- Electrica, 2023, v. 23, n. 3, p. 634, doi. 10.5152/electrica.2023.23043
- By:
- Publication type:
- Article
Empirical study of malware diversity in major Android markets.
- Published in:
- Journal of Cyber Security Technology, 2018, v. 2, n. 2, p. 51, doi. 10.1080/23742917.2018.1483876
- By:
- Publication type:
- Article
Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution.
- Published in:
- EAI Endorsed Transactions on Scalable Information Systems, 2020, v. 7, n. 28, p. 1, doi. 10.4108/eai.13-7-2018.165281
- By:
- Publication type:
- Article
A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6254876
- By:
- Publication type:
- Article
Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/4691203
- By:
- Publication type:
- Article
An Effective Threat Detection Framework for Advanced Persistent Cyberattacks.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 2, p. 4231, doi. 10.32604/cmc.2023.034287
- By:
- Publication type:
- Article
Perspectives and Reviews in the Development and Evolution of the Zero-Day Attacks.
- Published in:
- Informatica Economica, 2022, v. 26, n. 2, p. 46, doi. 10.24818/issn14531305/26.2.2022.05
- By:
- Publication type:
- Article
Digital Thieves Infiltrate Dental Offices.
- Published in:
- Ontario Dentist, 2017, v. 94, n. 3, p. 38
- By:
- Publication type:
- Article
MPSD: A Robust Defense Mechanism against Malicious PowerShell Scripts in Windows Systems.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 18, p. 3717, doi. 10.3390/electronics13183717
- By:
- Publication type:
- Article
Social Media Zero-Day Attack Detection Using TensorFlow.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 17, p. 3554, doi. 10.3390/electronics12173554
- By:
- Publication type:
- Article
Black-Box Evasion Attack Method Based on Confidence Score of Benign Samples.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 11, p. 2346, doi. 10.3390/electronics12112346
- By:
- Publication type:
- Article
Malicious Office Macro Detection: Combined Features with Obfuscation and Suspicious Keywords.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 22, p. 12101, doi. 10.3390/app132212101
- By:
- Publication type:
- Article
Lightweight Model for Botnet Attack Detection in Software Defined Network-Orchestrated IoT.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 8, p. 4699, doi. 10.3390/app13084699
- By:
- Publication type:
- Article
Evaluation of Survivability of the Automatically Obfuscated Android Malware.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 10, p. 4969, doi. 10.3390/app12104969
- By:
- Publication type:
- Article
Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 7, p. 3234, doi. 10.3390/app12073234
- By:
- Publication type:
- Article
Evaluation of Local Security Event Management System vs. Standard Antivirus Software.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 3, p. 1076, doi. 10.3390/app12031076
- By:
- Publication type:
- Article
Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 22, p. 7975, doi. 10.3390/app10227975
- By:
- Publication type:
- Article
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 1, doi. 10.1007/s10207-021-00577-0
- By:
- Publication type:
- Article
[m]allotROPism: a metamorphic engine for malicious software variation development.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 1, p. 61, doi. 10.1007/s10207-021-00541-y
- By:
- Publication type:
- Article
A defense framework against malware and vulnerability exploits.
- Published in:
- International Journal of Information Security, 2014, v. 13, n. 5, p. 439, doi. 10.1007/s10207-014-0233-1
- By:
- Publication type:
- Article
FloVasion: Towards Detection of non-sensitive Variable Based Evasive Information-Flow in Android Apps.
- Published in:
- IETE Journal of Research, 2022, v. 68, n. 4, p. 2580, doi. 10.1080/03772063.2020.1721338
- By:
- Publication type:
- Article
A Primer on Cybersecurity for Physicians.
- Published in:
- Acta Médica Portuguesa, 2019, v. 32, n. 9, p. 563, doi. 10.20344/amp.12542
- By:
- Publication type:
- Article
Threat prevention is the new frontier.
- Published in:
- 2015
- By:
- Publication type:
- Product Review
Fighting off multi-stage malware.
- Published in:
- 2014
- By:
- Publication type:
- Product Review