Printer Friendly

Browse Spyware topic

Analysis subtopic

Articles

1-59 out of 59 article(s)
Title Author Type Date Words
LSTM Android Malicious Behavior Analysis Based on Feature Weighting. Yang, Qing; Wang, Xiaoliang; Zheng, Jing; Ge, Wenqi; Bai, Ming; Jiang, Frank Report Jun 1, 2021 6455
B-Corr Model for Bot Group Activity Detection Based on Network Flows Traffic Analysis. Hostiadi, Dandy Pramana; Wibisono, Waskitho; Ahmad, Tohari Report Oct 1, 2020 8690
Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering. Zheng, Rongfeng; Liu, Jiayong; Niu, Weina; Liu, Liang; Li, Kai; Liao, Shan Aug 31, 2020 8415
Stochastic Stabilization of Malware Propagation in Wireless Sensor Network via Aperiodically Intermittent White Noise. Zhong, Xiaojing; Peng, Baihao; Deng, Feiqi; Liu, Guiyun Aug 31, 2020 5886
On-Device Detection of Repackaged Android Malware via Traffic Clustering. He, Gaofeng; Xu, Bingfeng; Zhang, Lu; Zhu, Haiting Jun 30, 2020 14669
Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection. Egitmen, Alper; Bulut, Irfan; Aygun, R. Can; Gunduz, A. Bilge; Seyrekbasan, Omer; Yavuz, A. Gokhan May 31, 2020 6854
Trend Micro Research Identifies Critical Industry 4.0 Attack Methods. May 12, 2020 551
Trend Micro Research Identifies Critical Industry 4.0 Attack Methods. May 12, 2020 800
A Novel Malware Classification Method Based on Crucial Behavior. Xiao, Fei; Sun, Yi; Du, Donggao; Li, Xuelei; Luo, Min Mar 31, 2020 7938
Incremental Learning for Malware Classification in Small Datasets. Li, Jingmei; Wu, Di XueWeifei; Wang, Jiaxiang Mar 31, 2020 6474
A Novel Framework to Classify Malware in MIPS Architecture-Based IoT Devices. Phu, Tran Nghi; Dang, Kien Hoang; Quoc, Dung Ngo; Dai, Nguyen Tho; Binh, Nguyen Ngoc Jan 1, 2020 8860
BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel. Pan, Jiaye; Zhuang, Yi; Sun, Binglin Jan 1, 2020 13986
Considering Quarantine in the SIRA Malware Propagation Model. Piqueira, Jose Roberto C.; Batistela, Cristiane M. Dec 31, 2019 4423
Fast k-NN based Malware Analysis in a Massive Malware Environment. Hwang, Jun-ho; Kwak, Jin; Lee, Tae-jin Dec 1, 2019 4808
Using XGBoost to Discover Infected Hosts Based on HTTP Traffic. Niu, Weina; Li, Ting; Zhang, Xiaosong; Hu, Teng; Jiang, Tianyu; Wu, Heng Nov 30, 2019 6872
A Malware and Variant Detection Method Using Function Call Graph Isomorphism. Bai, Jinrong; Shi, Qibin; Mu, Shiguang Oct 31, 2019 9378
Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization. Adebayo, Olawale Surajudeen; Aziz, Normaziah Abdul Aug 31, 2019 7522
DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network. Chen, Tieming; Mao, Qingyu; Lv, Mingqi; Li, Yinglong Report Apr 1, 2019 6740
A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments. Choi, Seul-Ki; Lee, Taejin; Kwak, Jin Case study Mar 1, 2019 4178
Sophos expands endpoint protection capabilities. Nov 21, 2018 402
The Threat of Split-Personality Android Malware on Developing Economy. Abikoye, Oluwakemi Christiana; Aruwa, Gyunka Benjamin Report Feb 1, 2018 5303
MALWARE ANALYSIS OF BACKDOOR CREATOR : FATRAT. Kunwar, Rakesh singh; Sharma, Priyanka; Kumar, K.V. Ravi Report Jan 1, 2018 1364
RoughDroid: Operative Scheme for Functional Android Malware Detection. Riad, Khaled; Ke, Lishan Jan 1, 2018 6147
Detecting Malware with an Ensemble Method Based on Deep Neural Network. Yan, Jinpei; Qi, Yong; Rao, Qifan Jan 1, 2018 11806
Use of Data Visualisation for Zero-Day Malware Detection. Venkatraman, Sitalakshmi; Alazab, Mamoun Jan 1, 2018 8576
A Security Sandbox Approach of Android Based on Hook Mechanism. Jiang, Xin; Liu, Mingzhe; Yang, Kun; Liu, Yanhua; Wang, Ruili Jan 1, 2018 4095
Design and Analysis of Push Notification-Based Malware on Android. Hyun, Sangwon; Cho, Junsung; Cho, Geumhwan; Kim, Hyoungshick Jan 1, 2018 8843
Android Malware Characterization Using Metadata and Machine Learning Techniques. Martin, Ignacio; Hernandez, Jose Alberto; Munoz, Alfonso; Guzman, Antonio Jan 1, 2018 7139
LSTM-Based Hierarchical Denoising Network for Android Malware Detection. Yan, Jinpei; Qi, Yong; Rao, Qifan Report Jan 1, 2018 12683
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework. Shim, Jaewoo; Lim, Kyeonghwan; Cho, Seong-je; Han, Sangchul; Park, Minkyu Jan 1, 2018 7191
Automatic Benchmark Generation Framework for Malware Detection. Liang, Guanghui; Pang, Jianmin; Shan, Zheng; Yang, Runqing; Chen, Yihang Jan 1, 2018 5647
Trend Micro Releases 'Digital Souks,' a Whitepaper on Cyberattacks at Gitex Technology Week 2017. Oct 11, 2017 889
Epidemiological Simulation Of A Nonlinear Computer Network Laboratories Using Kermack-Mckendrick Model. Caluza, Las Johansen B. Report Oct 1, 2017 2566
Learning Maliciousness in Cybersecurity Graphs. Walsh, Connor; Gottlieb, Sam; Rangamani, Akshay; Maida, Liz Report Sep 1, 2017 2634
An Attempt toward Authorship Analysis of Obfuscated .NET Binaries. Morovati, Kamran Report Sep 1, 2017 7982
Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection. Xu, Yanping; Wu, Chunhua; Zheng, Kangfeng; Niu, Xinxin; Lu, Tianling Report Sep 1, 2017 9943
Cyber firms warn of malware that could cause power outages. Jun 13, 2017 679
Massive Study Shows How Android Apps Collude To Collect User Data Without Permission. Apr 6, 2017 577
Identifying APT Malware Domain Based on Mobile DNS Logging. Niu, Weina; Zhang, Xiaosong; Yang, GuoWu; Zhu, Jianan; Ren, Zhongwei Report Jan 1, 2017 6049
Dynamical Analysis of a Computer Virus Propagation Model with Delay and Infectivity in Latent Period. Zhang, Zizhen; Bi, Dianjie Jan 1, 2017 4258
Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion. Wang, Xin; Zhang, Dafang; Su, Xin; Li, Wenjia Report Jan 1, 2017 8054
New Malware Detects Virtual Machines to Prevent Analysis. Sep 25, 2016 399
What tools do hackers use once they're inside your network? Sep 1, 2016 448
A mining approach for detecting unknown malware using N-Gram and SVM. Muthuvel, S.; Neelakandan, S.; Kumar M., Dinesh Report Apr 1, 2016 2938
Assessing computational behavior. Nov 1, 2015 131
Three considerations for file quarantine configuration. Berning, Tony Oct 1, 2015 1037
What are Ahmeti and Gruevski up to? Is Ali a "Trojan horse"? May 5, 2015 249
An empirical study on dos attacks and DDoS defense mechanism. Mary, S. Angel Latha; Sabaridha, E.; Sivagami, A.N.; Rani, M. Usha Report Oct 1, 2014 6355
Ancient Stuxnet Flaw Still Being Used to Attack Millions of Windows XP PCs. Aug 17, 2014 333
EnCase, ThreatGRID Integration provides insight into cyber threats. May 20, 2014 321
EnCase, ThreatGRID Integration provides insight into cyber threats. May 20, 2014 321
Linear SVM-based Android malware detection for reliable IoT services. Ham, Hyo-Sik; Kim, Hwan-Hee; Kim, Myung-Sup; Choi, Mi-Jung Report Jan 1, 2014 6418
Imperva's analysis of Flame malware. Jul 1, 2012 181
Techno-financial management aspects of potential threat--vulnerability of Malware in automotive electronics : analytical research findings. Venkatram, Ramesh Jul 1, 2010 6225
ScanSafe reports spyware skyrockets. Feb 1, 2007 362
Virus control: dodging spyware infections: just when you think it's safe to surf in the digital waters again, a new threat emerges. Masterson, Dave Jul 1, 2005 1084
Industry's first comprehensive report on Spyware. Jun 1, 2005 505
Defining spyware terms. Jun 1, 2005 831
"Malware evolution: January - March 2005". May 1, 2005 613

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters |