Printer Friendly

Browse Malware topic

Control subtopic


1-68 out of 68 article(s)
Title Author Type Date Words
Google removes scores of apps with BeiTaPlugin adware. Jun 6, 2019 369
DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network. Chen, Tieming; Mao, Qingyu; Lv, Mingqi; Li, Yinglong Report Apr 1, 2019 6740
A Policy-based Mechanism for restricting Execution of malicious apps in Android Smartphone. Dwivedi, Sanjeev Kumar; Muthumanickam, K.; Bist, Ankur Singh; Mahesh, P.C. Senthil Jul 1, 2018 3035
A Secure Encryption-Based Malware Detection System. Lin, Zhaowen; Xiao, Fei; Sun, Yi; Ma, Yan; Xing, Cong-Cong; Huang, Jun Report Apr 1, 2018 7347
Android malicious code Classification using Deep Belief Network. Shiqi, Luo; Shengwei, Tian; Long, Yu; Jiong, Yu; Hua, Sun Report Jan 1, 2018 7432
Revealing Influenced Selected Feature for P2P Botnet Detection. Wan, Ahmad Ramzi W.Y.; Faizal M.A.; Rudy, Fadhlee M.D.; Nur, Hidayah M.S. Report Dec 1, 2017 5969
Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection. Xu, Yanping; Wu, Chunhua; Zheng, Kangfeng; Niu, Xinxin; Lu, Tianling Report Sep 1, 2017 9943
De-cloaking malicious activities in smartphones using HTTP flow mining. Su, Xin; Liu, Xuchong; Lin, Jiuchuang; He, Shiming; Fu, Zhangjie; Li, Wenjia Report Jun 1, 2017 10551
A risk classification based approach for Android malware detection. Ye, Yilin; Wu, Lifa; Hong, Zheng; Huang, Kangyu Report Feb 1, 2017 8603
Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion. Wang, Xin; Zhang, Dafang; Su, Xin; Li, Wenjia Report Jan 1, 2017 8054
ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks. Garcia-Magarino, Ivan; Lacuesta, Raquel Report Jan 1, 2017 5517
Defending Malicious Script Attacks Using Machine Learning Classifiers. Khan, Nayeem; Abdullah, Johari; Khan, Adnan Shahid Report Jan 1, 2017 6390
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks. Liu, Lan; Ko, Ryan K.L.; Ren, Guangming; Xu, Xiaoping Report Jan 1, 2017 6091
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection. Xu, Yanping; Wu, Chunhua; Zheng, Kangfeng; Wang, Xu; Niu, Xinxin; Lu, Tianliang Report Jan 1, 2017 9287
PMCAP: A Threat Model of Process Memory Data on the Windows Operating System. Pan, Jiaye; Zhuang, Yi Report Jan 1, 2017 10541
The Concept Drift Problem in Android Malware Detection and Its Solution. Hu, Donghui; Ma, Zhongjin; Zhang, Xiaotian; Li, Peipei; Ye, Dengpan; Ling, Baohong Report Jan 1, 2017 8603
Method for detecting a malicious domain by using only well-known information. Kuyama, Masahiro; Kakizaki, Yoshio; Sasaki, Ryoichi Report Oct 1, 2016 3917
Downloading danger: the growing threat of mobile malware. Heires, Katherine Jun 1, 2016 1590
A mining approach for detecting unknown malware using N-Gram and SVM. Muthuvel, S.; Neelakandan, S.; Kumar M., Dinesh Report Apr 1, 2016 2938
Defending against android malware that uses Tor as their covert communications medium. Kioupakis, Fragkiskos-Emmanouil; Serrelis, Emmanouil Report Oct 1, 2015 6470
Intelligent approach for Android malware detection. Abdulla, Shubair; Altaher, Altyeb Report Aug 1, 2015 8096
Modeling and evaluating information diffusion for spam detection in microblogging networks. Chen, Kan; Zhu, Peidong; Chen, Liang; Xiong, Yueshan Report Aug 1, 2015 9213
ANNs on co-occurrence matrices for mobile malware detection. Xiao, Xi; Wang, Zhenlong; Li, Qi; Li, Qing; Jiang, Yong Report Jul 1, 2015 7362
Hacked! Lessons learned from an URL injection. Ajmi, Ayyoub Jun 1, 2015 2229
Hybrid malware detect memory mapper in kernel centric virtual machine. Shanmugam, M.; Chandni, C.; Jennifer, J.; Raadhuka, S. Report Jun 1, 2015 1639
Malware containment using weight based on incremental PageRank in dynamic social networks. Kong, Jong-Hwan; Han, Myung-Mook Report Jan 1, 2015 5425
Security breaches, network exploits and vulnerabilities: a conundrum and an analysis. Soluade, Oredola A.; Opara, Emmanuel U. Report Oct 1, 2014 6707
Cybercriminals using Ebola fear as bait to infect PCs: Symantec. Aug 19, 2014 358
Secure VDI in the age of botnets. Parkinson, David Jul 1, 2014 938
HAS-analyzer: detecting HTTP-based C&C based on the analysis of HTTP activity sets. Kim, Sung-Jin; Lee, Sungryoul; Bae, Byungchul Report May 1, 2014 6362
When malware slows you down. Goldsborough, Reid Apr 1, 2014 767
Security firms fight to stay on top of evolving threat environment. Brief article Feb 24, 2014 158
Risks continue to grow for small organizations' IT infrastructure. McCord, Michael Feb 21, 2014 1049
Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors. Nagunwa, Thomas Report Jan 1, 2014 6323
A malware detection scheme based on mining format information. Bai, Jinrong; Wang, Junfeng; Zou, Guozhong Report Jan 1, 2014 7294
Spyware resistant smartphone user authentication scheme. Kim, Taejin; Yi, Jeong Hyun; Seo, Changho Report Jan 1, 2014 5107
Federal cyber panic: fake scare, blown budget. Suderman, Peter Brief article Nov 1, 2013 271
A survey on malware propagation, analysis, and detection. Damshenas, Mohsen; Dehghantanha, Ali; Mahmoud, Ramlan Report Oct 1, 2013 10660
From Rio to the world: what security managers can learn from Brazil--front line in the global cyber wars. Mattos, Cristiano Lincoln May 1, 2013 1322
An automated malware detection system for android using behavior-based analysis AMDA. Abela, Kevin Joshua L.; Angeles, Don Kristopher E.; Delas Alas, Jan Raynier P.; Tolentino, Robert Jo Report Apr 1, 2013 4867
Microsoft, Symantec take a bite out of cybercrime. Brief article Mar 1, 2013 210
To catch a thief. Thilmany, Jean Brief article Dec 1, 2012 239
Mice and men - dealing with Stuxnet, Duqu, and other pests! MacLeod, Calum Dec 1, 2011 1171
BitDefender releases Stuxnet removal tool. Brief article Nov 1, 2010 294
Scaling intrusion prevention systems for 10G, 40G and beyond. Barry, Dan Joe Column Oct 1, 2010 1793
Spyware and adware: how do internet users defend themselves? Sriramachandramurthy, Rajendran; Balasubramanian, Siva K.; Hodis, Monica Alexandra Report Sep 22, 2009 9407
The lazy person's guide to malicious software. Long, Dale Oct 1, 2008 2971
More malicious attacks on the Threat Horizon warns ISF. Jul 1, 2008 326
Malware's evolving threat. Elliott, Robert Jun 1, 2007 533
Sophos warns of malware posing as Virginia Tech footage. Brief article Apr 20, 2007 191
Text on Net annoyances. Brief article Nov 1, 2006 102
Blue Coat Systems introduces web filtering appliances for mobile operators. Brief article Apr 20, 2006 232
Staying safe online: there are steps you can take to cut down on spam, viruses and spyware. Greenberg, Pam Feb 1, 2006 1615
Web users asked to submit malicious software reports to Stop Badware Coalition. Brief Article Jan 26, 2006 220
McAfee, Inc launches Stop Spyware initiative. Brief Article Nov 16, 2005 172
McAfee, Inc launches Stop Spyware initiative. Brief Article Nov 16, 2005 182
Ask techman. Brandt, D. Scott Column Nov 1, 2005 881
Users demand spyware protection from ISPs - report. Brief Article Oct 27, 2005 111
Users demand spyware protection from ISPs - report. Brief Article Oct 27, 2005 122
Webroot reveals UK has one of the highest levels of spyware infected PCs. Brief Article Oct 21, 2005 221
Sunbelt issues protection against keylogger. Brief Article Aug 12, 2005 159
"Malware evolution: January - March 2005". May 1, 2005 613
Beware of spyware: builders who depend on their computers need to understand the threats spyware poses. Zurier, Steve Feb 1, 2005 1963
Blue Coat Systems warns that spyware is set to be biggest IT threat in 2005. Brief Article Dec 13, 2004 165
Unmasking spyware. Martin, Kelly Aug 1, 2004 862
Spyware beware in Utah. Jul 1, 2004 319
New 'spyware' law could impose fines of USD3m. Brief Article Jun 21, 2004 150
Spyware! Who put that on my machine? Castelluccio, Michael Mar 1, 2004 1064

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters