Works matching DE "MALWARE"


Results: 2140
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12

    Paying the Price.

    Published in:
    Government Technology, 2017, v. 30, n. 7, p. 36
    By:
    • McCAULEY, RYAN
    Publication type:
    Article
    13

    Wages of Fear.

    Published in:
    Government Technology, 2014, v. 27, n. 8, p. 46
    By:
    • Newcombe, Tod
    Publication type:
    Article
    14

    Keeping Up the Fight.

    Published in:
    Government Technology, 2009, v. 22, n. 12, p. 36
    By:
    • COLLINS, HILTON
    Publication type:
    Article
    15
    16
    17
    18
    19
    20
    21

    An Android runtime security policy enforcement framework.

    Published in:
    Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 631, doi. 10.1007/s00779-011-0437-6
    By:
    • Banuri, Hammad;
    • Alam, Masoom;
    • Khan, Shahryar;
    • Manzoor, Jawad;
    • Ali, Bahar;
    • Khan, Yasar;
    • Yaseen, Mohsin;
    • Tahir, Mir;
    • Ali, Tamleek;
    • Alam, Quratulain;
    • Zhang, Xinwen
    Publication type:
    Article
    22
    23

    Pushdown model checking for malware detection.

    Published in:
    International Journal on Software Tools for Technology Transfer, 2014, v. 16, n. 2, p. 147, doi. 10.1007/s10009-013-0290-1
    By:
    • Song, Fu;
    • Touili, Tayssir
    Publication type:
    Article
    24
    25
    26
    27
    28
    29
    30
    31

    Security in Cloud-Native Services: A Survey.

    Published in:
    Journal of Cybersecurity & Privacy, 2023, v. 3, n. 4, p. 758, doi. 10.3390/jcp3040034
    By:
    • Theodoropoulos, Theodoros;
    • Rosa, Luis;
    • Benzaid, Chafika;
    • Gray, Peter;
    • Marin, Eduard;
    • Makris, Antonios;
    • Cordeiro, Luis;
    • Diego, Ferran;
    • Sorokin, Pavel;
    • Girolamo, Marco Di;
    • Barone, Paolo;
    • Taleb, Tarik;
    • Tserpes, Konstantinos
    Publication type:
    Article
    32
    33
    34
    35
    36

    The Evolution of Volatile Memory Forensics.

    Published in:
    Journal of Cybersecurity & Privacy, 2022, v. 2, n. 3, p. 556, doi. 10.3390/jcp2030028
    By:
    • Nyholm, Hannah;
    • Monteith, Kristine;
    • Lyles, Seth;
    • Gallegos, Micaela;
    • DeSantis, Mark;
    • Donaldson, John;
    • Taylor, Claire
    Publication type:
    Article
    37
    38
    39
    40
    41
    42
    43
    44
    45
    47
    48
    49
    50