Search

Your search keyword '"malware"' showing total 35,427 results

Search Constraints

Start Over You searched for: Descriptor "malware" Remove constraint Descriptor: "malware"
35,427 results on '"malware"'

Search Results

1. Comparative analysis of novel gradient boosting algorithm and recurrent neural network algorithms for malware detection and classification.

2. A Deep Learning Method for the Security Vulnerability Study of Feed-Forward Physical Unclonable Functions.

3. FSSDroid: Feature subset selection for Android malware detection.

4. Enhanced Android Ransomware Detection Through Hybrid Simultaneous Swarm-Based Optimization.

5. TL‐GNN: Android Malware Detection Using Transfer Learning.

6. An end-to-end framework for private DGA detection as a service.

7. Novel nature-inspired optimization approach-based svm for identifying the android malicious data.

8. Detection Strategies for COM, WMI, and ALPC-Based Multi-Process Malware.

9. Unmasking the common traits: an ensemble approach for effective malware detection.

10. NMal-Droid: network-based android malware detection system using transfer learning and CNN-BiGRU ensemble.

12. Earlier Decision on Detection of Ransomware Identification: A Comprehensive Systematic Literature Review.

13. Bioinspired artificial intelligence based android malware detection and classification for cybersecurity applications.

14. A Deep Learning Approach for Detecting Malware Using Autoencoder.

15. Leveraging Machine Learning for Android Malware Analysis: Insights from Static and Dynamic Techniques.

16. An Enhanced Framework to Mitigate Post Installation Cyber Attacks on Android Apps.

17. Early Ransomware Detection with Deep Learning Models.

18. Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar.

19. A Novel Malware Detection Model in the Software Supply Chain Based on LSTM and SVMs.

20. An Attention-Based Approach to Enhance the Detection and Classification of Android Malware.

21. Android malware detection using GIST based machine learning and deep learning techniques.

22. ProcGCN: detecting malicious process in memory based on DGCNN.

23. A Novel Static Analysis Approach Using System Calls for Linux IoT Malware Detection.

24. Prediction of novel malware using hybrid convolution neural network and long short-term memory approach.

25. An efficient security testing mechanism for Android Apps based on malware analysis and optimized XGBoost.

26. EFLM Task Force Preparation of Labs for Emergencies (TF-PLE) recommendations for reinforcing cyber-security and managing cyber-attacks in medical laboratories.

27. Communities of Inquiry for Offenders: Learning Malware Development on Asynchronous Platforms.

28. A machine learning-enhanced endpoint detection and response framework for fast and proactive defense against advanced cyber attacks.

29. CSMC: A Secure and Efficient Visualized Malware Classification Method Inspired by Compressed Sensing.

30. Employing combined spatial and frequency domain image features for machine learning-based malware detection.

31. Enhancing reinforcement learning based adversarial malware generation to evade static detection.

32. Enhancing Malware Detection through Self-Union Feature Selection Using Firefly Algorithm with Random Forest Classification.

33. Assessment Of Students Cybersecurity Awareness And Strategies To Safeguard Against Cyber Threats.

34. Encrypted malware detection methodology without decryption using deep learning-based approaches.

35. Behind the Code: Identifying Zero-Day Exploits in WordPress.

36. Malware Classification Using Dynamically Extracted API Call Embeddings.

37. Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm.

38. Malware Detection and Classification System Based on CNN-BiLSTM.

39. Enhancing Cyber-Threat Intelligence in the Arab World: Leveraging IoC and MISP Integration.

40. Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology

41. Analisis Malware Aquvaprn.exe Untuk Investigasi Sistem Operasi Dengan Metode Memory Forensics

42. A Tale of Two Markets: Investigating the Ransomware Payments Economy.

43. Entropy-extreme model for predicting the development of cyber epidemics at early stages

44. A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums

45. Malware Detection Among Contact Tracing Apps with Deep Learning

46. High Impact Malware Targeting Maritime Infrastructure

47. Early Detection and Classification of Zero-Day Attacks in Network Traffic Using Convolutional Neural Network

48. WCFG: A Weighted Control Flow Graph Dataset Design for Malware Classification

49. A Review of Malware Detection Applications and Research

Catalog

Books, media, physical & digital resources