Works matching DE "TROJAN horses (Computer viruses)"
Results: 60
The Hotel Industry Has a PoS Malware Problem.
- Published in:
- ISSA Journal, 2016, v. 14, n. 4, p. 37
- By:
- Publication type:
- Article
Privacy Preservation Using Machine Learning in the Internet of Things.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 16, p. 3477, doi. 10.3390/math11163477
- By:
- Publication type:
- Article
The Malware Detection Approach in the Design of Mobile Applications.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 5, p. 839, doi. 10.3390/sym14050839
- By:
- Publication type:
- Article
BEWARE OF GOVERNMENT AGENTS BEARING TROJAN HORSES.
- Published in:
- Akron Law Review, 2015, v. 48, n. 2, p. 315
- By:
- Publication type:
- Article
Proactive Cyber Defense and Reconfigurable Framework for Cyber Security.
- Published in:
- International Review on Computers & Software, 2007, v. 2, n. 2, p. 89
- By:
- Publication type:
- Article
Quasar Remote Access Trojan feature extraction depending on Ethical Hacking.
- Published in:
- Technium, 2022, v. 4, n. 1, p. 68
- By:
- Publication type:
- Article
Noise‐based logic locking scheme against signal probability skew analysis.
- Published in:
- IET Computers & Digital Techniques (Wiley-Blackwell), 2021, v. 15, n. 4, p. 279, doi. 10.1049/cdt2.12022
- By:
- Publication type:
- Article
Toward a Taxonomy of Malware Behaviors.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2758, doi. 10.1093/comjnl/bxv047
- By:
- Publication type:
- Article
A Framework for Modelling Trojans and Computer Virus Infection.
- Published in:
- Computer Journal, 1998, v. 41, n. 7, p. 444, doi. 10.1093/comjnl/41.7.444
- By:
- Publication type:
- Article
Two-step nuclear reactions: The Surrogate Method, the Trojan Horse Method and their common foundations.
- Published in:
- 2017
- By:
- Publication type:
- Letter
Removal of competing bacteria in coral microbiome through "trojan virus": A newly discovered mechanism of coral pathogenicity.
- Published in:
- SCIENCE CHINA Earth Sciences, 2023, v. 66, n. 8, p. 1906, doi. 10.1007/s11430-023-1146-y
- By:
- Publication type:
- Article
Ethical Hacking Solution to Defeat Cyber Attacks.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2018, v. 70, n. 2, p. 29
- By:
- Publication type:
- Article
SOFTWARE FOR COMPUTER SYSTEMS TROJANS DETECTION AS A SAFETY-CASE TOOL.
- Published in:
- Information & Security, 2012, v. 28, n. 1, p. 121, doi. 10.11610/isij.2810
- By:
- Publication type:
- Article
An exploratory data analysis of malware/ransomware cyberattacks: insights from an extensive cyber loss dataset.
- Published in:
- Enterprise Information Systems, 2024, v. 18, n. 9, p. 1, doi. 10.1080/17517575.2024.2369952
- By:
- Publication type:
- Article
Understanding the Influence of Ransomware: An Investigation on its Development, Mitigation and Avoidance Techniques.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2018, v. 4, n. 3, p. 123
- By:
- Publication type:
- Article
Memes, Trojan horses and the discursive power of audience.
- Published in:
- Human Affairs, 2015, v. 25, n. 2, p. 189, doi. 10.1515/humaff-2015-0017
- By:
- Publication type:
- Article
A 'Trojan Horse' in the Access to Justice - Party Autonomy and Consumer Arbitration in conflict in the ADR-Directive 2013/11/EU?
- Published in:
- European Review of Contract Law, 2014, v. 10, n. 2, p. 258, doi. 10.1515/ercl-2014-0009
- By:
- Publication type:
- Article
A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 8, p. 1457, doi. 10.3837/tiis.2011.08.006
- By:
- Publication type:
- Article
Multiparty quantum secure direct communication immune to collective noise.
- Published in:
- Quantum Information Processing, 2019, v. 18, n. 1, p. 1, doi. 10.1007/s11128-018-2119-z
- By:
- Publication type:
- Article
Two-party quantum key agreement against collective noise.
- Published in:
- Quantum Information Processing, 2016, v. 15, n. 12, p. 5023, doi. 10.1007/s11128-016-1436-3
- By:
- Publication type:
- Article
Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system.
- Published in:
- Quantum Information Processing, 2016, v. 15, n. 10, p. 4265, doi. 10.1007/s11128-016-1400-2
- By:
- Publication type:
- Article
Quantum dialogue protocols over collective noise using entanglement of GHZ state.
- Published in:
- Quantum Information Processing, 2016, v. 15, n. 7, p. 2971, doi. 10.1007/s11128-016-1309-9
- By:
- Publication type:
- Article
Fault-tolerant authenticated quantum dialogue using logical Bell states.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 9, p. 3499, doi. 10.1007/s11128-015-1040-y
- By:
- Publication type:
- Article
Two-layer quantum key distribution.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 6, p. 2111, doi. 10.1007/s11128-014-0876-x
- By:
- Publication type:
- Article
Trojan-horse attacks on quantum key distribution with classical Bob.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 2, p. 681, doi. 10.1007/s11128-014-0872-1
- By:
- Publication type:
- Article
Trojan horse attack free fault-tolerant quantum key distribution protocols.
- Published in:
- Quantum Information Processing, 2014, v. 13, n. 3, p. 781, doi. 10.1007/s11128-013-0689-3
- By:
- Publication type:
- Article
New quantum private comparison protocol using EPR pairs.
- Published in:
- Quantum Information Processing, 2012, v. 11, n. 2, p. 373, doi. 10.1007/s11128-011-0251-0
- By:
- Publication type:
- Article
Using deep learning to detect digitally encoded DNA trigger for Trojan malware in Bio-Cyber attacks.
- Published in:
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-13700-5
- By:
- Publication type:
- Article
Improvement of evidence collection module using live response technology on a windows system.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 16, p. 6453, doi. 10.1007/s11042-014-2098-8
- By:
- Publication type:
- Article
Randomness determines practical security of BB84 quantum key distribution.
- Published in:
- Scientific Reports, 2015, p. 16200, doi. 10.1038/srep16200
- By:
- Publication type:
- Article
Human immunodeficiency virus-1 core: The Trojan horse in virus--host interaction.
- Published in:
- Frontiers in Microbiology, 2022, v. 13, p. 1, doi. 10.3389/fmicb.2022.1002476
- By:
- Publication type:
- Article
Two-party quantum key agreement with five-particle entangled states.
- Published in:
- International Journal of Quantum Information, 2017, v. 15, n. 3, p. -1, doi. 10.1142/S0219749917500186
- By:
- Publication type:
- Article
Two-party quantum key agreement based on four-particle GHZ states.
- Published in:
- International Journal of Quantum Information, 2016, v. 14, n. 1, p. 1, doi. 10.1142/S0219749916500076
- By:
- Publication type:
- Article
Three-party quantum summation without a trusted third party.
- Published in:
- International Journal of Quantum Information, 2015, v. 13, n. 2, p. -1, doi. 10.1142/S0219749915500112
- By:
- Publication type:
- Article
BRIGHT HEADS: FIRE IMAGERY AND INTERTEXTUALITY IN ODYSSEY 18.
- Published in:
- Classical Journal, 2022, v. 118, n. 1, p. 31, doi. 10.1353/tcj.2022.0022
- By:
- Publication type:
- Article
Quantum Private Query Based on Bell State and Single Photons.
- Published in:
- International Journal of Theoretical Physics, 2018, v. 57, n. 7, p. 1983, doi. 10.1007/s10773-018-3723-5
- By:
- Publication type:
- Article
An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State.
- Published in:
- International Journal of Theoretical Physics, 2018, v. 57, n. 6, p. 1894, doi. 10.1007/s10773-018-3715-5
- By:
- Publication type:
- Article
Two Quantum Key Agreement Protocols Immune to Collective Noise.
- Published in:
- International Journal of Theoretical Physics, 2017, v. 56, n. 2, p. 328, doi. 10.1007/s10773-016-3165-x
- By:
- Publication type:
- Article
Trojan Horse Attack Free Fault-Tolerant Quantum Key Distribution Protocols Using GHZ States.
- Published in:
- International Journal of Theoretical Physics, 2016, v. 55, n. 9, p. 3993, doi. 10.1007/s10773-016-3028-5
- By:
- Publication type:
- Article
Special Issue: Frontiers in Antimicrobial Drug Discovery and Design.
- Published in:
- Molecules, 2017, v. 22, n. 7, p. 1127, doi. 10.3390/molecules22071127
- By:
- Publication type:
- Article
The "Trojan Horse" Approach to Tumor Immunotherapy: Targeting the Tumor Microenvironment.
- Published in:
- Journal of Immunology Research, 2014, p. 1, doi. 10.1155/2014/789069
- By:
- Publication type:
- Article
Enhancing Cybersecurity Through Live Forensic Investigation of Remote Access Trojan Attacks using FTK Imager Software.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 1, p. 217, doi. 10.18280/ijsse.140121
- By:
- Publication type:
- Article
Analysis of Anubis Trojan Attack on Android Banking Application Using Mobile Security Labware.
- Published in:
- International Journal of Safety & Security Engineering, 2023, v. 13, n. 1, p. 31, doi. 10.18280/ijsse.130104
- By:
- Publication type:
- Article
Malware detection by monitoring host's activities.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 547, doi. 10.3969/j.issn.1001-3695.2014.02.054
- By:
- Publication type:
- Article
When plants are Trojan horses for viruses.
- Published in:
- New Phytologist, 2023, v. 237, n. 4, p. 1071, doi. 10.1111/nph.18571
- By:
- Publication type:
- Article
HB<sup>+</sup>-MHT: Lightweight and Efficient Data Integrity Verification Scheme for Cloud Virtual Machines.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/9473246
- By:
- Publication type:
- Article
A Novel Framework for Prevention of Black hole in Wireless Sensor Networks using Deep Belief Network (DBN).
- Published in:
- Turkish Online Journal of Qualitative Inquiry, 2021, v. 12, n. 7, p. 5243
- By:
- Publication type:
- Article
The Man Who Never Was.
- Published in:
- Strategic Finance, 2007, v. 88, n. 7, p. 64
- Publication type:
- Article
Investigating Cybercrime News Reporting in Indian Online News Media.
- Published in:
- Library of Progress-Library Science, Information Technology & Computer, 2024, v. 44, n. 3, p. 210
- By:
- Publication type:
- Article
Defense Against Trojans Using Honeypots.
- Published in:
- IUP Journal of Science & Technology, 2011, v. 7, n. 3, p. 49
- By:
- Publication type:
- Article