Works matching Trojan (malware)
1
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-13700-5
- Islam, M. S.;
- Ivanov, S.;
- Awan, H.;
- Drohan, J.;
- Balasubramaniam, S.;
- Coffey, L.;
- Kidambi, S.;
- Sri-saan, W.
- Article
2
- Technium Social Sciences Journal, 2022, v. 30, p. 775
- Riyana, Ade;
- Santoso, Banu;
- Hartono, Rudi
- Article
3
- Techno.com, 2024, v. 23, n. 1, p. 112, doi. 10.62411/tc.v23i1.9741
- Mursalim;
- Darmawan, Wachid;
- Aprilia, Tresi
- Article
4
- iSChannel, 2011, v. 6, p. 14
- Article
5
- International Journal of Safety & Security Engineering, 2023, v. 13, n. 1, p. 31, doi. 10.18280/ijsse.130104
- Riadi, Imam;
- Sunardi;
- Aprilliansyah, Deco
- Article
6
- Journal of Sensors, 2022, p. 1, doi. 10.1155/2022/5724168
- Aqeel, Muhammad;
- Ali, Fahad;
- Iqbal, Muhammad Waseem;
- Rana, Toqir A.;
- Arif, Muhammad;
- Auwul, Md. Rabiul
- Article
7
- Journal of Arts Science & Technology, 2024, v. 16, n. 3, p. 57
- BARRETT-MAITLAND, NADINE A.;
- JOHNSON, KEVIN B.;
- LESLIE, STEPHEN;
- CLARKE, ZACHERY;
- PAISELY, TIANNA;
- PLUNKETT, ALEXICIA;
- BARRETT, RICARDO
- Article
8
- Electronics (2079-9292), 2025, v. 14, n. 8, p. 1486, doi. 10.3390/electronics14081486
- Alhogail, Areej;
- Alharbi, Rawan Abdulaziz
- Article
9
- Electronics (2079-9292), 2022, v. 11, n. 22, p. 3665, doi. 10.3390/electronics11223665
- Alzahrani, Abdullah I. A.;
- Ayadi, Manel;
- Asiri, Mashael M.;
- Al-Rasheed, Amal;
- Ksibi, Amel
- Article
10
- European Law Enforcement Research Bulletin, 2021, p. 1
- Coman, Iulian;
- Mihai, Ioan-Cosmin
- Article
11
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 547, doi. 10.3969/j.issn.1001-3695.2014.02.054
- ZHANG Yong-bin;
- ZHANG Yan-ning
- Article
12
- Symmetry (20738994), 2022, v. 14, n. 5, p. 839, doi. 10.3390/sym14050839
- Aboshady, Doaa;
- Ghannam, Naglaa;
- Elsayed, Eman;
- Diab, Lamiaa
- Article
13
- International Journal of Emerging Technologies in Learning, 2018, v. 13, n. 4, p. 4, doi. 10.3991/ijet.v13i04.8466
- He Huang;
- Haojiang Deng;
- Jun Chen;
- Luchao Han;
- Wei Wang
- Article
14
- Future Internet, 2024, v. 16, n. 10, p. 369, doi. 10.3390/fi16100369
- Owoh, Nsikak;
- Adejoh, John;
- Hosseinzadeh, Salaheddin;
- Ashawa, Moses;
- Osamor, Jude;
- Qureshi, Ayyaz
- Article
15
- ComputerWorld Hong Kong, 2009, v. 26, n. 4, p. 30
- Article
16
- International Review on Computers & Software, 2007, v. 2, n. 2, p. 89
- Article
17
- Scientometrics, 2021, v. 126, n. 3, p. 2013, doi. 10.1007/s11192-020-03834-6
- Mat, Sharfah Ratibah Tuan;
- Ab Razak, Mohd Faizal;
- Kahar, Mohd Nizam Mohmad;
- Arif, Juliza Mohamad;
- Mohamad, Salwana;
- Firdaus, Ahmad
- Article
18
- International Journal of Mathematical, Engineering & Management Sciences, 2025, v. 10, n. 4, p. 913, doi. 10.33889/IJMEMS.2025.10.4.044
- Kumar, Krishna;
- Mandoria, Hardwari Lal;
- Singh, Rajeev
- Article
19
- Informatics, 2021, v. 8, n. 1, p. 10, doi. 10.3390/informatics8010010
- Azeez, Nureni Ayofe;
- Odufuwa, Oluwanifise Ebunoluwa;
- Misra, Sanjay;
- Oluranti, Jonathan;
- Damaševičius, Robertas
- Article
20
- Journal of the Korea Institute of Information & Communication Engineering, 2020, v. 24, n. 4, p. 522, doi. 10.6109/jkiice.2020.24.4.522
- Article
21
- Journal of the Korea Institute of Information & Communication Engineering, 2016, v. 20, n. 2, p. 343, doi. 10.6109/jkiice.2016.20.2.343
- Article
22
- Applied Sciences (2076-3417), 2023, v. 13, n. 4, p. 2629, doi. 10.3390/app13042629
- Xie, Nannan;
- Qin, Zhaowei;
- Di, Xiaoqiang
- Article
23
- Applied Sciences (2076-3417), 2023, v. 13, n. 4, p. 2508, doi. 10.3390/app13042508
- Buriro, Attaullah;
- Buriro, Abdul Baseer;
- Ahmad, Tahir;
- Buriro, Saifullah;
- Ullah, Subhan
- Article
24
- Applied Sciences (2076-3417), 2023, v. 13, n. 4, p. 2456, doi. 10.3390/app13042456
- Bronakowski, Mark;
- Al-khassaweneh, Mahmood;
- Al Bataineh, Ali
- Article
25
- VIDHIGYA: The Journal of Legal Awareness, 2021, v. 16, n. 1/2, p. 18, doi. 10.5958/0974-4533.2021.00004.X
- Kumar, Neeraj;
- Diwedi, D. N.
- Article
26
- Journal of Frontiers of Computer Science & Technology, 2021, v. 15, n. 12, p. 2315, doi. 10.3778/j.issn.1673-9418.2007087
- WANG Chen;
- GUO Chun;
- SHEN Guowei;
- CUI Yunhe
- Article
27
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 2, p. 1978
- Kiruthika, S.;
- Roshni, A.;
- Padmavathi, G.
- Article
28
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 376
- Reddy, M. Manjunath;
- Raghava, S.;
- Tarun, N. Naga;
- Reddy, S. Chetan;
- Rao, G. Ramakoteswara;
- Chandra, J. Vijaya
- Article
29
- International Journal of Information Security Science, 2017, v. 6, n. 4, p. 57
- Jones, Justin;
- Shashidhar, Narasimha
- Article
30
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 5, p. 17294, doi. 10.48084/etasr.8422
- Rashid, Salar Jamal;
- Baker, Shatha A.;
- Alsaif, Omar I.;
- Ahmad, Ali I.
- Article
31
- International Journal of Advances in Soft Computing & Its Applications, 2020, v. 12, n. 3, p. 123
- Al-Masalha, Haya;
- Hnaif, Adnan A.;
- Kanan, Tarek
- Article
32
- Complexity, 2020, p. 1, doi. 10.1155/2020/2903635
- Zhong, Xiaojing;
- Peng, Baihao;
- Deng, Feiqi;
- Liu, Guiyun
- Article
33
- Journal of Intelligent Information Systems, 2010, v. 35, n. 1, p. 1, doi. 10.1007/s10844-009-0086-7
- Yanfang Ye;
- Tao Li;
- Kai Huang;
- Qingshan Jiang;
- Yong Chen
- Article
34
- Multimedia Tools & Applications, 2023, v. 82, n. 19, p. 29227, doi. 10.1007/s11042-023-14689-3
- Ghosh, Argha;
- Senthilrajan, A.
- Article
35
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00205-z
- Hossain, Md. Alamgir;
- Islam, Md. Saiful
- Article
36
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00079-5
- Yang, Chun;
- Xu, Jinghui;
- Liang, Shuangshuang;
- Wu, Yanna;
- Wen, Yu;
- Zhang, Boyang;
- Meng, Dan
- Article
37
- Mathematics (2227-7390), 2023, v. 11, n. 16, p. 3477, doi. 10.3390/math11163477
- El-Gendy, Sherif;
- Elsayed, Mahmoud Said;
- Jurcut, Anca;
- Azer, Marianne A.
- Article
38
- British Journal of Healthcare Computing & Information Management, 2010, p. 21
- Article
39
- International Journal of Information Security, 2024, v. 23, n. 4, p. 3007, doi. 10.1007/s10207-024-00875-3
- Vasilellis, Efstratios;
- Botsos, Vasileios;
- Anagnostopoulou, Argiro;
- Gritzalis, Dimitris
- Article
40
- Journal of Medical Systems, 2018, v. 42, n. 6, p. 1, doi. 10.1007/s10916-018-0966-x
- Firdaus, Ahmad;
- Anuar, Nor Badrul;
- Razak, Mohd Faizal Ab;
- Hashem, Ibrahim Abaker Targio;
- Bachok, Syafiq;
- Sangaiah, Arun Kumar
- Article
41
- International Journal of Cyber Behavior, Psychology & Learning, 2015, v. 5, n. 2, p. 44, doi. 10.4018/IJCBPL.2015040104
- Article
42
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/7369634
- Zhu, Qinyu;
- Chen, Quan;
- Liu, Yichen;
- Akhtar, Zahid;
- Siddique, Kamran
- Article
43
- EURASIP Journal on Information Security, 2023, v. 2023, n. 1, p. 1, doi. 10.1186/s13635-023-00139-y
- Wang, Xiaoning;
- Liu, Jia;
- Zhang, Chunjiong
- Article
44
- Intel Technology Journal, 2006, v. 10, n. 4, p. 285, doi. 10.1535/itj.1004.04
- Agosta, John M.;
- Chandrashekar, Jaideep;
- Dash, Denver H.;
- Dave, Manish;
- Durham, David;
- Khosravi, Hormuzd;
- Hong Li;
- Purcell, Stacy;
- Rungta, Sanjay;
- Sahita, Ravi;
- Savagaonkar, Uday;
- Schooler, Eve M.
- Article
45
- Information (2078-2489), 2023, v. 14, n. 9, p. 516, doi. 10.3390/info14090516
- Sadi, Mehdi;
- Talukder, Bashir Mohammad Sabquat Bahar;
- Mishty, Kaniz;
- Rahman, Md Tauhidur
- Article
46
- Computers, Materials & Continua, 2025, v. 82, n. 3, p. 4093, doi. 10.32604/cmc.2025.059615
- Ksibi, Amel;
- Zakariah, Mohammed;
- Almuqren, Latifah;
- Alluhaidan, Ala Saleh
- Article
47
- Computers, Materials & Continua, 2020, v. 65, n. 3, p. 1891, doi. 10.32604/cmc.2020.010933
- Dong-Wook Kim;
- Gun-Yoon Shin;
- Myung-Mook Han
- Article
48
- Journal of Research & Practice in Information Technology, 2007, v. 39, n. 3, p. 181
- Jianyun Xu;
- Sung, Andrew H.;
- Mukkamala, Srinivas;
- Qingzhong Liu
- Article
49
- Canadian Journal of Rural Medicine (Joule Inc.), 2011, v. 16, n. 4, p. 137
- Article