Search

Your search keyword '"MALWARE"' showing total 35,376 results

Search Constraints

Start Over You searched for: Descriptor "MALWARE" Remove constraint Descriptor: "MALWARE"
35,376 results on '"MALWARE"'

Search Results

1. Novel nature-inspired optimization approach-based svm for identifying the android malicious data.

2. NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble.

3. Unmasking the common traits: an ensemble approach for effective malware detection.

5. A Deep Learning Approach for Detecting Malware Using Autoencoder.

6. Bioinspired artificial intelligence based android malware detection and classification for cybersecurity applications.

7. Leveraging Machine Learning for Android Malware Analysis: Insights from Static and Dynamic Techniques.

8. An Enhanced Framework to Mitigate Post Installation Cyber Attacks on Android Apps.

9. A Novel Static Analysis Approach Using System Calls for Linux IoT Malware Detection.

10. A Novel Malware Detection Model in the Software Supply Chain Based on LSTM and SVMs.

11. Prediction of novel malware using hybrid convolution neural network and long short-term memory approach.

12. Android malware detection using GIST based machine learning and deep learning techniques.

13. An efficient security testing mechanism for Android Apps based on malware analysis and optimized XGBoost.

14. EFLM Task Force Preparation of Labs for Emergencies (TF-PLE) recommendations for reinforcing cyber-security and managing cyber-attacks in medical laboratories.

15. Communities of Inquiry for Offenders: Learning Malware Development on Asynchronous Platforms.

16. Employing combined spatial and frequency domain image features for machine learning-based malware detection.

17. CSMC: A Secure and Efficient Visualized Malware Classification Method Inspired by Compressed Sensing.

18. Enhancing reinforcement learning based adversarial malware generation to evade static detection.

19. Encrypted malware detection methodology without decryption using deep learning-based approaches.

20. Behind the Code: Identifying Zero-Day Exploits in WordPress.

21. Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm.

22. Malware Detection and Classification System Based on CNN-BiLSTM.

23. Enhancing Cyber-Threat Intelligence in the Arab World: Leveraging IoC and MISP Integration.

24. Malware Classification Using Dynamically Extracted API Call Embeddings.

25. Enhancing Malware Detection through Self-Union Feature Selection Using Firefly Algorithm with Random Forest Classification.

26. Assessment Of Students Cybersecurity Awareness And Strategies To Safeguard Against Cyber Threats.

27. Attribution classification method of APT malware based on multi-feature fusion.

28. Keeping Pegasus on the wing: legitimizing cyber espionage.

29. Semantic aware-based instruction embedding for binary code similarity detection.

30. Comparative Analysis of Machine Learning Models for Android Malware Detection.

32. Mechanism analysis of regulating Turing instability and Hopf bifurcation of malware propagation in mobile wireless sensor networks.

33. Cybersecurity for autonomous vehicles against malware attacks in smart-cities.

34. Effectiveness of machine learning based android malware detectors against adversarial attacks.

35. Cyberattacks on Energy Infrastructures as Modern War Weapons—Part I: Analysis and Motives.

36. A comprehensive review on permissions-based Android malware detection.

37. Real-time system call-based ransomware detection.

38. An AI powered system call analysis with bag of word approaches for the detection of intrusions and malware in Australian Defence Force Academy and virtual machine monitor malware attack data set.

39. CyberSentinel: A Transparent Defense Framework for Malware Detection in High-Stakes Operational Environments.

40. Advanced Android Malware Detection through Deep Learning Optimization.

41. Improving Windows Malware Detection Using the Random Forest Algorithm and Multi-View Analysis.

42. Hybrid Deep Learning Approach Based on LSTM and CNN for Malware Detection.

43. Leveraging deep learning and image conversion of executable files for effective malware detection: A static malware analysis approach.

44. GRASE: Granulometry Analysis With Semi Eager Classifier to Detect Malware.

45. African Vulture Optimization-Based Decision Tree (AVO-DT): An Innovative Method for Malware Identification and Evaluation through the Application of Meta-Heuristic Optimization Algorithm.

46. Parent process termination: an adversarial technique for persistent malware.

47. Visualising Static Features and Classifying Android Malware Using a Convolutional Neural Network Approach.

48. Ransomware Detection Model Based on Adaptive Graph Neural Network Learning †.

49. Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection.

50. Speech emotion recognition systems and their security aspects.

Catalog

Books, media, physical & digital resources