Works about MALWARE
Results: 2057
Light-Weight Federated Transfer Learning Approach to Malware Detection on Computational Edges.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 2, p. 12
- By:
- Publication type:
- Article
An Intelligent Technique for Android Malware Identification Using Fuzzy Rank-Based Fusion.
- Published in:
- Technologies (2227-7080), 2025, v. 13, n. 2, p. 45, doi. 10.3390/technologies13020045
- By:
- Publication type:
- Article
Improving Cyber Defense Against Ransomware: A Generative Adversarial Networks-Based Adversarial Training Approach for Long Short-Term Memory Network Classifier.
- Published in:
- Electronics (2079-9292), 2025, v. 14, n. 4, p. 810, doi. 10.3390/electronics14040810
- By:
- Publication type:
- Article
Probing Malware Propagation Model with Variable Infection Rates Under Integer, Fractional, and Fractal–Fractional Orders.
- Published in:
- Fractal & Fractional, 2025, v. 9, n. 2, p. 90, doi. 10.3390/fractalfract9020090
- By:
- Publication type:
- Article
Optimizing Malware Detection and Classification in Real-Time Using Hybrid Deep Learning Approaches.
- Published in:
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 1, p. 141, doi. 10.18280/ijsse.150115
- By:
- Publication type:
- Article
A Blockchain-Based Malware Detection Model for IoT Devices.
- Published in:
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 1, p. 13, doi. 10.18280/ijsse.150102
- By:
- Publication type:
- Article
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 1153, doi. 10.3390/s25041153
- By:
- Publication type:
- Article
Stackelberg Security Games with Contagious Attacks on a Network: Reallocation to the Rescue.
- Published in:
- Journal of Artificial Intelligence Research, 2023, v. 77, p. 487, doi. 10.1613/jair.1.14563
- By:
- Publication type:
- Article
"Our Biggest Nightmare Is Here": Cyberattacks are targeting school districts. How can schools respond to keep data and systems secure?
- Published in:
- Education Next, 2022, v. 22, n. 2, p. 44
- By:
- Publication type:
- Article
USO DE MALWARE EM INVESTIGAÇÃO CRIMINAL.
- Published in:
- Actualidad Jurídica (1578-956X), 2017, n. 47, p. 19
- By:
- Publication type:
- Article
A model-driven approach for vulnerability evaluation of modern physical protection systems.
- Published in:
- Software & Systems Modeling, 2019, v. 18, n. 1, p. 523, doi. 10.1007/s10270-016-0572-7
- By:
- Publication type:
- Article
IPAnalyzer: A novel Android malware detection system using ranked Intents and Permissions.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 33, p. 78957, doi. 10.1007/s11042-024-18511-6
- By:
- Publication type:
- Article
Novel nature-inspired optimization approach-based svm for identifying the android malicious data.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 28, p. 71579, doi. 10.1007/s11042-023-18097-5
- By:
- Publication type:
- Article
An efficient security testing mechanism for Android Apps based on malware analysis and optimized XGBoost.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 24, p. 64767, doi. 10.1007/s11042-023-18066-y
- By:
- Publication type:
- Article
A new approach to android malware detection using fuzzy logic-based simulated annealing and feature selection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 4, p. 10525, doi. 10.1007/s11042-023-16035-z
- By:
- Publication type:
- Article
EfficientNet deep learning meta-classifier approach for image-based android malware detection.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 16, p. 24891, doi. 10.1007/s11042-022-14236-6
- By:
- Publication type:
- Article
Android malware detection applying feature selection techniques and machine learning.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 6, p. 9517, doi. 10.1007/s11042-022-13767-2
- By:
- Publication type:
- Article
S-DCNN: stacked deep convolutional neural networks for malware classification.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 21, p. 30997, doi. 10.1007/s11042-022-12615-7
- By:
- Publication type:
- Article
Multimodal information fusion for android malware detection using lazy learning.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 9, p. 12077, doi. 10.1007/s11042-021-10749-8
- By:
- Publication type:
- Article
Scenario-based cyber attack·defense education system on virtual machines integrated by web technologies for protection of multimedia contents in a network.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 26/27, p. 34085, doi. 10.1007/s11042-019-08583-0
- By:
- Publication type:
- Article
Dynamic Input-Output Models in Environmental Problems: A Computational Approach with CAS Software.
- Published in:
- Computational Economics, 2016, v. 47, n. 3, p. 489, doi. 10.1007/s10614-015-9497-4
- By:
- Publication type:
- Article
A Dynamic Interface for Trade Pattern Formation in Multi-regional Multi-sectoral Input-output Modeling.
- Published in:
- Computational Economics, 2015, v. 46, n. 4, p. 671, doi. 10.1007/s10614-014-9466-3
- By:
- Publication type:
- Article
An Investigation of Quantum and Parallel Computing Effects on Malware Families Classification.
- Published in:
- Journal of Applied Science & Technology Trends (JASTT), 2023, v. 4, n. 2, p. 101, doi. 10.38094/jastt42153
- By:
- Publication type:
- Article
Employing combined spatial and frequency domain image features for machine learning-based malware detection.
- Published in:
- Electronic Research Archive, 2024, v. 32, n. 7, p. 1, doi. 10.3934/era.2024192
- By:
- Publication type:
- Article
Synchronization of heterogeneous harmonic oscillators for generalized uniformly jointly connected networks.
- Published in:
- Electronic Research Archive, 2023, v. 31, n. 8, p. 1, doi. 10.3934/era.2023258
- By:
- Publication type:
- Article
SEGURANÇA DA INFORMAÇÃO COM FOCO NA PROPAGAÇÃO IMINENTE DE RANSOMWARE NAS CORPORAÇÕES.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2023, v. 16, n. 5, p. 1, doi. 10.54751/revistafoco.v16n5-024
- By:
- Publication type:
- Article
Preventing State-Led Cyberattacks Using the Bright Internet and Internet Peace Principles.
- Published in:
- Journal of the Association for Information Systems, 2018, v. 19, n. 3, p. 152, doi. 10.17705/1jais.00488
- By:
- Publication type:
- Article
Evaluation of social bot detection models.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2022, v. 30, n. 4, p. 1269, doi. 10.55730/1300-0632.3848
- By:
- Publication type:
- Article
Android malware classification based on ANFIS with fuzzy c-means clustering using significant application permissions.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2017, v. 25, n. 3, p. 2232, doi. 10.3906/elk-1602-107
- By:
- Publication type:
- Article
A comparison of feature extraction techniques for malware analysis.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2017, v. 25, n. 2, p. 1173, doi. 10.3906/elk-1601-189
- By:
- Publication type:
- Article
Polymorphic worm detection using strong token-pair signatures.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2009, v. 17, n. 2, p. 163, doi. 10.3906/elk-0905-29
- By:
- Publication type:
- Article
Rootkit Detection on Embedded IoT Devices.
- Published in:
- Acta Cybernetica, 2021, v. 25, n. 2, p. 369, doi. 10.14232/actacyb.288834
- By:
- Publication type:
- Article
SolarWinds Hack and its Threat to Cloud Services.
- Published in:
- ISSA Journal, 2022, v. 20, n. 1, p. 14
- By:
- Publication type:
- Article
The Post Exploitation Malware Era.
- Published in:
- ISSA Journal, 2019, v. 17, n. 1, p. 12
- By:
- Publication type:
- Article
The Basics of Privileged Access Management.
- Published in:
- ISSA Journal, 2018, v. 16, n. 3, p. 18
- By:
- Publication type:
- Article
CPU Bugs: Trading Security for Performance: Exploring the causes and long-term impact from the infamous Meltdown and Spectre vulnerabilities.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 25
- By:
- Publication type:
- Article
The Post Exploitation Malware Era.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 35
- By:
- Publication type:
- Article
WannaCry/NotPetya and How We Failed Miserably!
- Published in:
- ISSA Journal, 2017, v. 15, n. 10, p. 35
- By:
- Publication type:
- Article
Hollywood Presbyterian Medical Center Ransomware: A Retrospective Review.
- Published in:
- ISSA Journal, 2017, v. 15, n. 10, p. 29
- By:
- Publication type:
- Article
Malware in 2017: The More Things Change.
- Published in:
- ISSA Journal, 2017, v. 15, n. 10, p. 23
- By:
- Publication type:
- Article
Addressing Malware WITH Cybersecurity Awareness.
- Published in:
- ISSA Journal, 2017, v. 15, n. 10, p. 16
- By:
- Publication type:
- Article
Managing Change Successfully: Takeaways from Malware.
- Published in:
- ISSA Journal, 2017, v. 15, n. 10, p. 9
- By:
- Publication type:
- Article
Did We Really Once Think We Could Get Out in front of Malware?
- Published in:
- ISSA Journal, 2017, v. 15, n. 10, p. 7
- By:
- Publication type:
- Article
Static ID Overhaul.
- Published in:
- ISSA Journal, 2017, v. 15, n. 10, p. 6
- By:
- Publication type:
- Article
Disrupting the Disruptors: How Cybersecurity Can Confront Hackers and a Skilled Worker Shortage with Its Own Disruptive Technologies.
- Published in:
- ISSA Journal, 2017, v. 15, n. 8, p. 36
- By:
- Publication type:
- Article
Recon and Respond to Malware Threats in the Cloud.
- Published in:
- ISSA Journal, 2017, v. 15, n. 5, p. 22
- By:
- Publication type:
- Article
Security Technology Market, Predictions, and Future Cyber Focus.
- Published in:
- ISSA Journal, 2017, v. 15, n. 4, p. 9
- By:
- Publication type:
- Article
When Baby Monitors Become Weapons: Manufacturer Liability for Distributed Denial of Service Attacks by an Internet of Things Botnet Army.
- Published in:
- ISSA Journal, 2017, v. 15, n. 3, p. 14
- By:
- Publication type:
- Article
Internet of Things -- A Veritable Smorgasbord of Privacy, Security & Trust Challenges.
- Published in:
- ISSA Journal, 2016, v. 14, n. 8, p. 8
- By:
- Publication type:
- Article
Does Anybody Remember the Phone Book?
- Published in:
- ISSA Journal, 2016, v. 14, n. 5, p. 5
- By:
- Publication type:
- Article