Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Logiciel malveillant")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 72

  • Page / 3
Export

Selection :

  • and

Stuxnet and the vital role of critical infrastructure operators and engineersHAGEROTT, Mark.International journal of critical infrastructure protection (Print). 2014, Vol 7, Num 4, pp 244-246, issn 1874-5482, 3 p.Article

Classification of malware based on integrated static and dynamic featuresISLAM, Rafiqul; RONGHUA TIAN; BATTEN, Lynn M et al.Journal of network and computer applications. 2013, Vol 36, Num 2, pp 646-656, issn 1084-8045, 11 p.Article

Réseaux et cybercriminalité, l'opérateur au cœur de la bataille : Les cyber-attaques, un risque pour nos grandes infractructures ?CARON, Pierre.REE. Revue de l'électricité et de l'électronique. 2012, Num 2, pp 36-44, issn 1265-6534, 9 p.Article

Eternal War in MemorySZEKERES, László; PAYER, Mathias; LENX TAO WEI et al.IEEE security & privacy. 2014, Vol 12, Num 3, pp 45-53, issn 1540-7993, 9 p.Conference Paper

SplitScreen: Enabling Efficient, Distributed Malware DetectionSANG KIL CHA; MORARU, Iulian; JIYONG JANG et al.Journal of communication and networks (Seoul. Print). 2011, Vol 13, Num 2, pp 187-200, issn 1229-2370, 14 p.Article

Security Core to the Edge: Securing Critical Information through Enhanced Cross Domain Systems (CDS) to the Tactical EdgeFARROHA, Bassam S; FARROHA, Deborah L; WHITFIELD, Melinda M et al.Proceedings of SPIE, the International Society for Optical Engineering. 2010, Vol 7707, issn 0277-786X, isbn 9780819481719, 77070M.1-77070M.12Conference Paper

Thwarting Obfuscated Malware via Differential Fault Analysis : Mobile Application SecuritySUAREZ-TANGIL, Guillermo; TAPIADOR, Juan E; LOMBARDI, Flavio et al.Computer (Long Beach, CA). 2014, Vol 47, Num 6, pp 24-31, issn 0018-9162, 8 p.Article

TorrentGuard: Stopping scam and malware distribution in the BitTorrent ecosystemCUEVAS, Rubén; KRYCZKA, Michal; GONZALEZ, Roberto et al.Computer networks (1999). 2014, Vol 59, pp 77-90, issn 1389-1286, 14 p.Article

Malware Detection and Prevention System Based on Multi-Stage RulesALAZAB, Ammar; HOBBS, Michael; ABAWAJY, Jemal et al.International journal of information security and privacy. 2013, Vol 7, Num 2, pp 29-43, issn 1930-1650, 15 p.Article

Intelligent High-Interaction Web Honeypots Based on URL Conversion SchemeYAGI, Takeshi; TANIMOTO, Naoto; HARIU, Takeo et al.IEICE transactions on communications. 2011, Vol 94, Num 5, pp 1339-1347, issn 0916-8516, 9 p.Article

A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads : Information and Communication System SecurityNAKAZATO, Junji; SONG, Jungsuk; ETO, Masashi et al.IEICE transactions on information and systems. 2011, Vol 94, Num 11, pp 2150-2158, issn 0916-8532, 9 p.Article

Bot armies as threats to network securityBANKS, Sheila B; STYTZ, Martin R.Proceedings of SPIE, the International Society for Optical Engineering. 2007, pp 657002.1-657002.10, issn 0277-786X, isbn 978-0-8194-6692-1Conference Paper

Analysis on the Sequential Behavior of Malware Attacks : Information and Communication System SecurityROSYID, Nur Rohman; OHRUI, Masayuki; KIKUCHI, Hiroaki et al.IEICE transactions on information and systems. 2011, Vol 94, Num 11, pp 2139-2149, issn 0916-8532, 11 p.Article

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities : Information and Communication System SecurityINOUE, Daisuke; YOSHIOKA, Katsunari; ETO, Masashi et al.IEICE transactions on information and systems. 2009, Vol 92, Num 5, pp 945-954, issn 0916-8532, 10 p.Article

Executable Code Recognition in Network Flows Using Instruction Transition ProbabilitiesKIM, Ikkyun; KANG, Koohong; CHOI, Yangseo et al.IEICE transactions on information and systems. 2008, Vol 91, Num 7, pp 2076-2078, issn 0916-8532, 3 p.Article

An RBAC-based access control model for object-oriented systems offering dynamic aspect featuresCHOU, Shih-Chien.IEICE transactions on information and systems. 2005, Vol 88, Num 9, pp 2143-2147, issn 0916-8532, 5 p.Article

Approach for malware identification using dynamic behaviour and outcome triggeringHAO BAI; HU, Chang-Zhen; JING, Xiao-Chuan et al.IET information security (Print). 2014, Vol 8, Num 2, pp 140-151, issn 1751-8709, 12 p.Article

On cyberattack mechanismsCHOI, Jae-Hyuk; JEONG, Ok-Ran; HAN, Woo-Jin et al.International journal of web and grid services (Print). 2013, Vol 9, Num 4, pp 351-368, issn 1741-1106, 18 p.Article

Mobile Phone Vulnerabilities : A New Generation of MalwareJAMALUDDIN, Jazilah; ZOTOU, Nikoletta; EDWARDS, Reuben et al.IEEE International Symposium on Consumer Electronics. 2004, pp 199-202, isbn 0-7803-8526-8, 1Vol, 4 p.Conference Paper

Crimeware-as-a-service—A survey of commoditized crimeware in the underground marketSOOD, Aditya K; ENBODY, Richard J.International journal of critical infrastructure protection (Print). 2013, Vol 6, Num 1, pp 28-38, issn 1874-5482, 11 p.Article

Safety securing approach against cyber-attacks for process control systemHASHIMOTO, Yoshihiro; TOYOSHIMA, Takeshi; YOGO, Shuichi et al.Computers & chemical engineering. 2013, Vol 57, pp 181-186, issn 0098-1354, 6 p.Article

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring : Information and Communication System SecurityNAKAO, Koji; INOUE, Daisuke; ETO, Masashi et al.IEICE transactions on information and systems. 2009, Vol 92, Num 5, pp 787-798, issn 0916-8532, 12 p.Article

Using qualia and novel representations in malware detectionBIRRER, Bobby; RAINES, Richard A; BALDWIN, Rusty O et al.Proceedings of SPIE, the International Society for Optical Engineering. 2009, Vol 7352, issn 0277-786X, isbn 978-0-8194-7618-0, 73520W.1-73520W.9Conference Paper

Detecting mobile malware threats to homeland security through static analysis : Advanced Technologies for Homeland Defense and SecuritySEO, Seung-Hyun; GUPTA, Aditi; ASMAA MOHAMED SALLAM et al.Journal of network and computer applications. 2014, Vol 38, pp 43-53, issn 1084-8045, 11 p.Article

Growing Grapes in Your Computer to Defend Against MalwareZHIYONG SHAN; XIN WANG.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 196-207, issn 1556-6013, 12 p.Article

  • Page / 3