Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Programa dañino")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 25

  • Page / 1
Export

Selection :

  • and

Réseaux et cybercriminalité, l'opérateur au cœur de la bataille : Les cyber-attaques, un risque pour nos grandes infractructures ?CARON, Pierre.REE. Revue de l'électricité et de l'électronique. 2012, Num 2, pp 36-44, issn 1265-6534, 9 p.Article

SplitScreen: Enabling Efficient, Distributed Malware DetectionSANG KIL CHA; MORARU, Iulian; JIYONG JANG et al.Journal of communication and networks (Seoul. Print). 2011, Vol 13, Num 2, pp 187-200, issn 1229-2370, 14 p.Article

Security Core to the Edge: Securing Critical Information through Enhanced Cross Domain Systems (CDS) to the Tactical EdgeFARROHA, Bassam S; FARROHA, Deborah L; WHITFIELD, Melinda M et al.Proceedings of SPIE, the International Society for Optical Engineering. 2010, Vol 7707, issn 0277-786X, isbn 9780819481719, 77070M.1-77070M.12Conference Paper

Intelligent High-Interaction Web Honeypots Based on URL Conversion SchemeYAGI, Takeshi; TANIMOTO, Naoto; HARIU, Takeo et al.IEICE transactions on communications. 2011, Vol 94, Num 5, pp 1339-1347, issn 0916-8516, 9 p.Article

A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads : Information and Communication System SecurityNAKAZATO, Junji; SONG, Jungsuk; ETO, Masashi et al.IEICE transactions on information and systems. 2011, Vol 94, Num 11, pp 2150-2158, issn 0916-8532, 9 p.Article

Bot armies as threats to network securityBANKS, Sheila B; STYTZ, Martin R.Proceedings of SPIE, the International Society for Optical Engineering. 2007, pp 657002.1-657002.10, issn 0277-786X, isbn 978-0-8194-6692-1Conference Paper

Mobile Phone Vulnerabilities : A New Generation of MalwareJAMALUDDIN, Jazilah; ZOTOU, Nikoletta; EDWARDS, Reuben et al.IEEE International Symposium on Consumer Electronics. 2004, pp 199-202, isbn 0-7803-8526-8, 1Vol, 4 p.Conference Paper

Analysis on the Sequential Behavior of Malware Attacks : Information and Communication System SecurityROSYID, Nur Rohman; OHRUI, Masayuki; KIKUCHI, Hiroaki et al.IEICE transactions on information and systems. 2011, Vol 94, Num 11, pp 2139-2149, issn 0916-8532, 11 p.Article

Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities : Information and Communication System SecurityINOUE, Daisuke; YOSHIOKA, Katsunari; ETO, Masashi et al.IEICE transactions on information and systems. 2009, Vol 92, Num 5, pp 945-954, issn 0916-8532, 10 p.Article

Executable Code Recognition in Network Flows Using Instruction Transition ProbabilitiesKIM, Ikkyun; KANG, Koohong; CHOI, Yangseo et al.IEICE transactions on information and systems. 2008, Vol 91, Num 7, pp 2076-2078, issn 0916-8532, 3 p.Article

Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring : Information and Communication System SecurityNAKAO, Koji; INOUE, Daisuke; ETO, Masashi et al.IEICE transactions on information and systems. 2009, Vol 92, Num 5, pp 787-798, issn 0916-8532, 12 p.Article

Using qualia and novel representations in malware detectionBIRRER, Bobby; RAINES, Richard A; BALDWIN, Rusty O et al.Proceedings of SPIE, the International Society for Optical Engineering. 2009, Vol 7352, issn 0277-786X, isbn 978-0-8194-7618-0, 73520W.1-73520W.9Conference Paper

Markov Random Fields for Malware Propagation: The Case of Chain NetworksKARYOTIS, Vasileios.IEEE communications letters. 2010, Vol 14, Num 9, pp 875-877, issn 1089-7798, 3 p.Article

Time Zone Correlation Analysis of Malware/Bot Downloads : Internet Architectures, Protocols, and Management Methods that Enable Sustainable DevelopmentSISAAT, Khamphao; KIKUCHI, Hiroaki; MATSUO, Shunji et al.IEICE transactions on communications. 2013, Vol 96, Num 7, pp 1753-1763, issn 0916-8516, 11 p.Article

Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime ExecutionCHOI, Younghan; KIM, Hyoungchun; LEE, Donghoon et al.IEICE transactions on communications. 2012, Vol 95, Num 5, pp 1711-1721, issn 0916-8516, 11 p.Article

Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensicsCHENG, Bo-Chao; LIAO, Guo-Tan; HUANG, Hsu-Chen et al.Annales des télécommunications. 2014, Vol 69, Num 7-8, pp 379-389, issn 0003-4347, 11 p.Article

Evaluations and Analysis of Malware Prevention Methods on WebsitesYAGI, Takeshi; MURAYAMA, Junichi; HARIU, Takeo et al.IEICE transactions on communications. 2013, Vol 96, Num 12, pp 3091-3100, issn 0916-8516, 10 p.Article

An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor NetworksDE, Pradip; YONGHE LIU; DAS, Sajal K et al.IEEE transactions on mobile computing. 2009, Vol 8, Num 3, pp 413-425, issn 1536-1233, 13 p.Article

Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management SchemeLIN CAI; ROJAS-CESSA, Roberto.IEEE communications letters. 2009, Vol 13, Num 10, pp 812-814, issn 1089-7798, 3 p.Article

Modeling Information Dissemination in Generalized Social NetworksCHOU, Yu-Feng; HUANG, Hsin-Heng; CHENG, Ray-Guang et al.IEEE communications letters. 2013, Vol 17, Num 7, pp 1356-1359, issn 1089-7798, 4 p.Article

VMM detection using privilege rings and benchmark execution timesSHARIFI, Mohsen; SALIMI, Hadi; SABERI, Alireza et al.International journal of communication networks and distributed systems (Print). 2013, Vol 11, Num 3, pp 310-326, issn 1754-3916, 17 p.Article

Stateless model for the prevention of malicious communication channelsSINGH, A; MORA DOS SANTOS, A. L; NORDSTRÖM, O et al.International journal of computers & applications. 2006, Vol 28, Num 3, pp 285-297, issn 1206-212X, 13 p.Article

Stochastic filtering of a random Fibonacci sequence: Theory and applicationsFARINA, A; FANTACCI, C; FRASCA, M et al.Signal processing. 2014, Vol 104, pp 212-224, issn 0165-1684, 13 p.Article

Hidden and under control: A survey and outlook on covert channel-internal control protocolsWENDZEL, Steffen; KELLER, Jörg.Annales des télécommunications. 2014, Vol 69, Num 7-8, pp 417-430, issn 0003-4347, 14 p.Article

Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)GUANHUA YAN; EIDENBENZ, Stephan.IEEE transactions on mobile computing. 2009, Vol 8, Num 3, pp 353-368, issn 1536-1233, 16 p.Article

  • Page / 1