Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Malware")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 102

  • Page / 5
Export

Selection :

  • and

Classification of malware based on integrated static and dynamic featuresISLAM, Rafiqul; RONGHUA TIAN; BATTEN, Lynn M et al.Journal of network and computer applications. 2013, Vol 36, Num 2, pp 646-656, issn 1084-8045, 11 p.Article

A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads : Information and Communication System SecurityNAKAZATO, Junji; SONG, Jungsuk; ETO, Masashi et al.IEICE transactions on information and systems. 2011, Vol 94, Num 11, pp 2150-2158, issn 0916-8532, 9 p.Article

SplitScreen: Enabling Efficient, Distributed Malware DetectionSANG KIL CHA; MORARU, Iulian; JIYONG JANG et al.Journal of communication and networks (Seoul. Print). 2011, Vol 13, Num 2, pp 187-200, issn 1229-2370, 14 p.Article

Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation AttacksRASTOGI, Vaibhav; YAN CHEN; XUXIAN JIANG et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 99-108, issn 1556-6013, 10 p.Article

Viruses, worms, and trojan horses : Serious crimes, nuisance, or both? = Virus, vers, et chevaux de Troie : Crimes sérieux, nuisance, ou les deux ?HUGHES, Lorine A; DELONE, Gregory J.Social science computer review. 2007, Vol 25, Num 1, pp 78-98, issn 0894-4393, 21 p.Article

TorrentGuard: Stopping scam and malware distribution in the BitTorrent ecosystemCUEVAS, Rubén; KRYCZKA, Michal; GONZALEZ, Roberto et al.Computer networks (1999). 2014, Vol 59, pp 77-90, issn 1389-1286, 14 p.Article

Malware Detection and Prevention System Based on Multi-Stage RulesALAZAB, Ammar; HOBBS, Michael; ABAWAJY, Jemal et al.International journal of information security and privacy. 2013, Vol 7, Num 2, pp 29-43, issn 1930-1650, 15 p.Article

Analysis on the Sequential Behavior of Malware Attacks : Information and Communication System SecurityROSYID, Nur Rohman; OHRUI, Masayuki; KIKUCHI, Hiroaki et al.IEICE transactions on information and systems. 2011, Vol 94, Num 11, pp 2139-2149, issn 0916-8532, 11 p.Article

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities : Information and Communication System SecurityINOUE, Daisuke; YOSHIOKA, Katsunari; ETO, Masashi et al.IEICE transactions on information and systems. 2009, Vol 92, Num 5, pp 945-954, issn 0916-8532, 10 p.Article

Executable Code Recognition in Network Flows Using Instruction Transition ProbabilitiesKIM, Ikkyun; KANG, Koohong; CHOI, Yangseo et al.IEICE transactions on information and systems. 2008, Vol 91, Num 7, pp 2076-2078, issn 0916-8532, 3 p.Article

On cyberattack mechanismsCHOI, Jae-Hyuk; JEONG, Ok-Ran; HAN, Woo-Jin et al.International journal of web and grid services (Print). 2013, Vol 9, Num 4, pp 351-368, issn 1741-1106, 18 p.Article

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring : Information and Communication System SecurityNAKAO, Koji; INOUE, Daisuke; ETO, Masashi et al.IEICE transactions on information and systems. 2009, Vol 92, Num 5, pp 787-798, issn 0916-8532, 12 p.Article

Stuxnet and the vital role of critical infrastructure operators and engineersHAGEROTT, Mark.International journal of critical infrastructure protection (Print). 2014, Vol 7, Num 4, pp 244-246, issn 1874-5482, 3 p.Article

Réseaux et cybercriminalité, l'opérateur au cœur de la bataille : Les cyber-attaques, un risque pour nos grandes infractructures ?CARON, Pierre.REE. Revue de l'électricité et de l'électronique. 2012, Num 2, pp 36-44, issn 1265-6534, 9 p.Article

Personal privacy, information assurance, and the threat posed by malware technologySTYTZ, Martin R; BANKS, Sheila B.Proceedings of SPIE, the International Society for Optical Engineering. 2006, pp 624107.1-624107.9, issn 0277-786X, isbn 0-8194-6297-7, 1VolConference Paper

Binary-Code Obfuscations in Prevalent Packer ToolsROUNDY, Kevin A; MILLER, Barton P.ACM computing surveys. 2014, Vol 46, Num 1, issn 0360-0300, 4.1-4.32Article

Society under threat... but not from AINARAYANAN, Ajit.AI & society. 2013, Vol 28, Num 1, pp 87-94, issn 0951-5666, 8 p.Article

Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management SchemeLIN CAI; ROJAS-CESSA, Roberto.IEEE communications letters. 2009, Vol 13, Num 10, pp 812-814, issn 1089-7798, 3 p.Article

Growing Grapes in Your Computer to Defend Against MalwareZHIYONG SHAN; XIN WANG.IEEE transactions on information forensics and security. 2014, Vol 9, Num 1-2, pp 196-207, issn 1556-6013, 12 p.Article

A fast malware detection algorithm based on objective-oriented association miningYUXIN DING; XUEBING YUAN; KE TANG et al.Computers & security. 2013, Vol 39, pp 315-324, issn 0167-4048, 10 p., bArticle

Detecting mobile malware threats to homeland security through static analysis : Advanced Technologies for Homeland Defense and SecuritySEO, Seung-Hyun; GUPTA, Aditi; ASMAA MOHAMED SALLAM et al.Journal of network and computer applications. 2014, Vol 38, pp 43-53, issn 1084-8045, 11 p.Article

Time Zone Correlation Analysis of Malware/Bot Downloads : Internet Architectures, Protocols, and Management Methods that Enable Sustainable DevelopmentSISAAT, Khamphao; KIKUCHI, Hiroaki; MATSUO, Shunji et al.IEICE transactions on communications. 2013, Vol 96, Num 7, pp 1753-1763, issn 0916-8516, 11 p.Article

F-Sign: Automatic, Function-Based Signature Generation for MalwareSHABTAI, Asaf; MENAHEM, Eitan; ELOVICI, Yuval et al.IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews. 2011, Vol 41, Num 4, pp 494-508, issn 1094-6977, 15 p.Article

Metamorphic Malware Detection Using Code MetricsCANFORA, Gerardo; MERCALDO, Francesco; VISAGGIO, Corrado Aaron et al.Information security journal (Print). 2014, Vol 23, Num 1-3, pp 57-67, issn 1939-3555, 11 p.Article

VMM detection using privilege rings and benchmark execution timesSHARIFI, Mohsen; SALIMI, Hadi; SABERI, Alireza et al.International journal of communication networks and distributed systems (Print). 2013, Vol 11, Num 3, pp 310-326, issn 1754-3916, 17 p.Article

  • Page / 5