لینک های اصلی
انواع جستجو
ارتباط
پیشنهادها
Visual malware detection using local malicious pattern
nima20
امتیاز
20000 تومان
Clustering for malware classification
A comparison of static, dynamic, and hybrid analysis for malware detection
30000 تومان
A graph-based model for malware detection and classification using system-call groups
Identification of malicious android app using manifest and opcode features
Semantics-aware detection of targeted attacks: a survey
Chronicle of a Java Card death
Erratum to: Evolution and characterization of point-of-sale RAM scraping malware
The other guys: automated analysis of marginalized malware
Plaintext side channels in TLS Chiphertex
Experimental analysis of hidden Markov model based secure misuse intrusion trace classification and hacking detection
Secure and light IoT protocol (SLIP) for anti-hacking
Secure information authentication protocol between patients and medical staff in a hospital environment
A study on the service and trend of Fintech security based on text-mining: focused on the data of Korean online news
Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions
Research on financial institutional network partition design for anti-hacking
Multi-context features for detecting malicious programs
Deciphering malware’s use of TLS (without decryption)
A performance evaluation of information security training in public sector
Testing closed source software: computer forensic tool case study
Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis
Intelligent OS X malware threat detection with code inspection
Implementation of dataset staging process with improved security in a new analysis facility for ALICE experiment
Hacking and convergence computing
State of the art of network protocol reverse engineering tools
Trends of anti-analysis operations of malwares observed in API call logs
Automated generation of colluding apps for experimental research
An evaluation method for secure virtual network embedding algorithms
Secure access policy for efficient resource in mobile computing environment
Detecting stealth DHCP starvation attack using machine learning approach
اول 109 110 111 112 صفحه - 113 114 115 116 117 118 آخر
اشتراک در خبرنامه ما
و دریافت آخرین اخبار و پیشنهادات