The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for malware with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2004 (46) 2005 (53) 2006 (78) 2007 (125) 2008 (161) 2009 (175) 2010 (169) 2011 (216) 2012 (214) 2013 (262) 2014 (301) 2015 (335) 2016 (461) 2017 (486) 2018 (565) 2019 (615) 2020 (642) 2021 (742) 2022 (751) 2023 (733) 2024 (146)
Publication types (Num. hits)
article(2857) book(8) data(16) incollection(50) inproceedings(4185) phdthesis(128) proceedings(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 774 occurrences of 392 keywords

Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Antonio San Martino, Xavier Perramon Defending E-Banking Services: Antiphishing Approach. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage Spamalytics: an empirical analysis of spam marketing conversion. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unsolicited email, spam, conversion
10Christopher W. Clifton Opportunities for private and secure machine learning. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, privacy, artificial intelligence
10Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel Rootkit-resistant disks. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, storage, labels, rootkits
10Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage When good instructions go bad: generalizing return-oriented programming to RISC. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF return-into-libc, return-oriented programming, RISC, SPARC
10Antonio San Martino, Xavier Perramon Securing Web Banking Applications. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Shane Balfe, Kenneth G. Paterson Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract). Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Mayank Lahiri, Arun S. Maiya, Rajmonda Sulo Caceres, Habiba, Tanya Y. Berger-Wolf The Impact of Structural Changes on Predictions of Diffusion in Networks. Search on Bibsonomy ICDM Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Stephen H. Bach, Marcus A. Maloof Paired Learners for Concept Drift. Search on Bibsonomy ICDM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Elizabeth Van Ruitenbeek, William H. Sanders Modeling Peer-to-Peer Botnets. Search on Bibsonomy QEST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, Sahin Albayrak Monitoring smartphones for anomaly detection. Search on Bibsonomy MOBILWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile device, monitoring, anomaly detection, smartphone
10Corrado Leita, Marc Dacier SGNET: Implementation insights. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Prateek Saxena, R. Sekar 0001, Varun Puranik Efficient fine-grained binary instrumentationwith applications to taint-tracking. Search on Bibsonomy CGO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF binary analysis/rewriting, taint tracking, information flow
10Garrett Brown, Travis Howe, Micheal Ihbe, Atul Prakash 0001, Kevin Borders Social networks and context-aware spam. Search on Bibsonomy CSCW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, social networks, spam, email, facebook
10Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch Identifying and Analyzing Web Server Attacks. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malicious web servers, client honeypots, Network forensics
10Ejike Ofuonye, James Miller 0001 Resolving JavaScript Vulnerabilities in the Browser Runtime. Search on Bibsonomy ISSRE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Zhiqiang Lin, Xiangyu Zhang 0001 Deriving input syntactic structure from execution. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bottom-up grammar, input lineage, top-down grammar, reverse engineering, control dependence, syntax tree
10Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005 Countering Persistent Kernel Rootkits through Systematic Hook Discovery. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Abhinav Srivastava, Jonathon T. Giffin Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machine introspection, attack prevention, Firewall
10Andrew Brown 0005, Mark Ryan 0001 Monitoring the Execution of Third-Party Software on Mobile Devices. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Fabrizio Baiardi, Daniele Sgandurra Secure Sharing of an ICT Infrastructure through Vinci. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Mohd Fadzli Marhusin, David Cornforth, Henry Larkin Malicious Code Detection Architecture Inspired by Human Immune System. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF System Call, Malicious Code Detection
10Shlomi Dolev, Elad Michael Schiller, Paul G. Spirakis, Philippas Tsigas Strategies for repeated games with subsystem takeovers: implementable by deterministic and self-stabilizing automata (extended abstract). Search on Bibsonomy Autonomics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF folk-theorem, joint deviation, game theory, self-stabilization, finite-automata
10Bryan D. Payne, Martim Carbone, Monirul Islam Sharif, Wenke Lee Lares: An Architecture for Secure Active Monitoring Using Virtualization. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtualization, active monitoring, introspection
10Young-Gab Kim, Sanghyun Cho, Junsup Lee, Min-Soo Lee, In Ho Kim, Sung Hoon Kim Method for Evaluating the Security Risk of a Website Against Phishing Attacks. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Z. Cliffe Schreuders, Christian Payne Reusability of Functionality-Based Application Confinement Policy Abstractions. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Functionality-Based Application Confinement (FBAC), Application-Oriented Access Control, Application Confinement, Reusable Policy, Role-Based Access Control (RBAC), Usable Security, Sandbox
10Muazzam Siddiqui, Morgan C. Wang, Joohan Lee Detecting Trojans Using Data Mining Techniques. Search on Bibsonomy IMTIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trojan Detection, Data Mining, Support Vector Machines, Principal Component Analysis, Random Forest, Disassembly
10Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Timothy Fraser, Matthew R. Evenson, William A. Arbaugh VICI Virtual Machine Introspection for Cognitive Immunity. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta Understanding implications of DNS zone provisioning. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF zone transfer, dns, domain name system
10Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF semiconductor technology, LED technology, herd computing, wireless technology, spyware
10William H. Allen, Richard Ford How Not to Be Seen II: The Defenders Fight Back. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Dianne Solomon Balancing Privacy and Risk in the E-Messaging World. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Iván Arce A Surprise Party (on Your Computer)? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Fred B. Schneider Trusted Computing in Context. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Michael N. Gagnon, Stephen Taylor, Anup K. Ghosh Software Protection through Anti-Debugging. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Brandi Ortega News Briefs. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Linfeng Li, Marko Helenius Usability evaluation of anti-phishing toolbars. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Vinoo Thomas, Nitin Jyoti Bot countermeasures. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Analyzing network traffic to detect self-decrypting exploit code. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF exploit code, static analysis, emulation, detection, polymorphic, decryption
10Mohammad Mannan, Paul C. van Oorschot Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Ronald C. Dodge, Corey Bertram, Daniel Ragsdale Remote Virtual Information Assurance Network. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jason Raber, Eric Laspe Emulated Breakpoint Debugger and Data Mining Using Detours. Search on Bibsonomy WCRE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jason Raber, Eric Laspe Deobfuscator: An Automated Approach to the Identification and Removal of Code Obfuscation. Search on Bibsonomy WCRE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Raman Sharykin, Phillip A. Porras Applying Formal Evaluation to Worm Defense Design. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jay Kothari, Maxim Shevertalov, Edward Stehle, Spiros Mancoridis A Probabilistic Approach to Source Code Authorship Identification. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Beatrice Cynthia Dhinakaran, Cheol-Joo Chae, Jae-Kwang Lee An Empirical Study of Spam and Spam Vulnerable email Accounts. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Xuxian Jiang, Xinyuan Wang 0005 "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Frederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert 0001 An Approach to a Trustworthy System Architecture Using Virtualization. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jesus Molina, Xavier Chorin, Michel Cukier Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SSH compromises, filesystem data, host intrusion detection systems, intrusion detection systems evaluation
10Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda Design Issues of an Isolated Sandbox Used to Analyze Malwares. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Guanhua Yan, Stephan J. Eidenbenz Modeling Propagation Dynamics of Bluetooth Worms. Search on Bibsonomy ICDCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Mohammed S. Alam, Son Thanh Vuong APHIDS++: A Mobile Agent Based Intrusion Detection System. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Rui Joaquim, Carlos Ribeiro CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment. Search on Bibsonomy VOTE-ID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF vote manipulation, Internet voting
10Martin Szydlowski, Christopher Kruegel, Engin Kirda Secure Input for Web Applications. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10David Whyte, Paul C. van Oorschot, Evangelos Kranakis Tracking Darkports for Network Defense. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Phillip A. Porras Privacy-Enabled Global Threat Monitoring. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Sampo Töyssy, Marko Helenius About malicious software in smartphones. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Rachna Dhamija, Peter Cassidy, Phillip M. Hallam-Baker, Markus Jacobsson Phoiling phishing. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Leon Moonen, Spiros Mancoridis Code Based Software Security Assessments. Search on Bibsonomy WCRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Moez Draief, Ayalvadi J. Ganesh, Laurent Massoulié Thresholds for virus spread on networks. Search on Bibsonomy VALUETOOLS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SIR epidemic, largest connected component, random graphs, spectral radius
10Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi Attacking Confidentiality: An Agent Based Approach. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Brian O'Higgins Deep packet inspection comes to the desktop. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Phillip A. Porras, Vitaly Shmatikov Large-scale collection and sanitization of network security data: risks and challenges. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Amanda M. Holland-Minkley Cyberattacks: a lab-based introduction to computer security. Search on Bibsonomy SIGITE Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF laboratory coursework, computer security, IT education
10Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Bharath Madhusudan, John W. Lockwood A Hardware-Accelerated System for Real-Time Worm Detection. Search on Bibsonomy IEEE Micro The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang 0009 Anomaly Detection in Computer Security and an Application to File System Accesses. Search on Bibsonomy ISMIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Anomaly Detection, File System, Wrapping, Host-Based Intrusion Detection
10Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann Efficient Deployment of Honeynets for Statistical and Forensic Analysis of Attacks from the Internet. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Honeypots, Forensics, Honeynets
10Kevin R. B. Butler, Patrick D. McDaniel Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10João Schwarz da Silva Challenges and opportunities in ICT: a European perspective. Search on Bibsonomy Mobile Data Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo An Email Worm Vaccine Architecture. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Norman Feske, Christian Helmuth A Nitpicker's guide to a minimal-complexity secure GUI. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Volker Roth 0002 Obstacles to the Adoption of Mobile Agents. Search on Bibsonomy Mobile Data Management The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Mobile agents
10Shalendra Chhabra, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati A Protocol for Reputation Management in Super-Peer Networks. Search on Bibsonomy DEXA Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Gordon W. Romney, Brady R. Stevenson An isolated, multi-platform network sandbox for teaching IT security system engineers. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF collaborative student teaching, security best practices, security laboratory, security system engineer, information technology, information assurance, data privacy, curricula
10Ajay Gupta 0002, Daniel C. DuVarney Using Predators to Combat Worms and Viruses: A Simulation-Based Study. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Steven Furnell Cybercrime: Vandalizing the Information Society. Search on Bibsonomy ICWE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10John W. Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection. Search on Bibsonomy IWAN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10George Lawton Virus Wars: Fewer Attacks, New Threats. Search on Bibsonomy Computer The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Junming Liu, Yuntao Zhao, Yongxin Feng, Yutao Hu, Xiangyu Ma SeMalBERT: Semantic-based malware detection with bidirectional encoder representations from transformers. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Diego Soi, Alessandro Sanna, Davide Maiorca, Giorgio Giacinto Enhancing android malware detection explainability through function call graph APIs. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Zhen Liu, Ruoyu Wang 0002, Nathalie Japkowicz, Heitor Murilo Gomes, Bitao Peng, Wenbin Zhang 0002 SeGDroid: An Android malware detection method based on sensitive function call graph learning. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Meghna Dhalaria, Ekta Gandotra MalDetect: A classifier fusion approach for detection of android malware. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Shaojie Chen, Bo Lang, Hongyu Liu, Yikai Chen, Yucai Song Android malware detection method based on graph attention networks and deep fusion of multimodal features. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9L. Dhanya, R. Chitra A novel autoencoder based feature independent GA optimised XGBoost classifier for IoMT malware detection. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Hashida Haidros Rahima Manzil, S. Manohar Naik Detection approaches for android malware: Taxonomy and review analysis. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Jiyun Yang, Can Gui Android malware detection framework based on sensitive opcodes and deep reinforcement learning. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Deepika Maddali Convnext-Eesnn: An effective deep learning based malware detection in edge based IIOT. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Abdulrahman Alamer A privacy-preserving federated learning with a secure collaborative for malware detection models using Internet of Things resources. Search on Bibsonomy Internet Things The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Praful R. Pardhi, Jitendra Kumar Rout, Niranjan Kumar Ray 0001, Santosh Kumar Sahu Classification of Malware from the Network Traffic Using Hybrid and Deep Learning Based Approach. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Pawan Kumar, Sukhdip Singh Security Testing of Android Apps Using Malware Analysis and XGboost Optimized by Adaptive Particle Swarm Optimization. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Shovana Das, Anshika Garg, Sanjay Kumar Stacking Ensemble-Based Approach for Malware Detection. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Chakradhar Verma, C. P. Gupta Effect of Vaccination on Stability of Wireless Sensor Network Against Malware Attack: An Epidemiological Model. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Praful R. Pardhi, Jitendra Kumar Rout, Niranjan Kumar Ray 0001, Santosh Kumar Sahu Correction: Classification of Malware from the Network Traffic Using Hybrid and Deep Learning Based Approach. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Jitendra Kumar, Balaji Rajendran, Sithu D. Sudarsan Zero-Day Malware Classification and Detection Using Machine Learning. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Sidra Siddiqui, Tamim Ahmed Khan An Overview of Techniques for Obfuscated Android Malware Detection. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9John Musgrave, Alina Campan, Temesguen Messay Kebede, David Kapp, Boyang Wang Search and Retrieval in Semantic-Structural Representations of Novel Malware. Search on Bibsonomy Adv. Artif. Intell. Mach. Learn. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
9Silviu Constantin Vitel, Marilena Lupascu, Dragos Teodor Gavrilut, Henri Luchian Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 7276 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license