Dissertations / Theses on the topic 'Malware Analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Malware Analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Iqbal, Muhammad Shahid, and Muhammad Sohail. "Runtime Analysis of Malware." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2930.
Full textKrál, Benjamin. "Forenzní analýza malware." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385910.
Full textWedum, Petter Langeland. "Malware Analysis; : A Systematic Approach." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8948.
Full textSantoro, Tiziano. "Automatic behavioural analysis of malware." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-64103.
Full textKim, Ye Kyung. "Framework for Analysis of Android Malware." University of Akron / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=akron1418252974.
Full textSubramanian, Nandita. "Analysis of Rank Distance for Malware Classification." University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1479823187035784.
Full textGorugantu, Swetha. "Malware Analysis Skills Taught in University Courses." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1527083698607394.
Full textCozzi, Emanuele. "Binary Analysis for Linux and IoT Malware." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS197.
Full textCortellazzi, Jacopo. "Code transplantation for adversarial malware." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17288/.
Full textWebb, Matthew S. "Evaluating tool based automated malware analysis through persistence mechanism detection." Thesis, Kansas State University, 2018. http://hdl.handle.net/2097/38783.
Full textBlack, Paul. "Techniques for the reverse engineering of banking malware." Thesis, Federation University of Australia, 2020. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/175276.
Full textVu, Hong Linh. "DNS Traffic Analysis for Network-based Malware Detection." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93842.
Full textMalhotra, Asheer. "Calculating malware severity rating using threat tree analysis." Thesis, Mississippi State University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1586986.
Full textLu, Gen. "Analysis of Evasion Techniques in Web-based Malware." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/312567.
Full textYin, Heng. "Malware detection and analysis via layered annotative execution." W&M ScholarWorks, 2009. https://scholarworks.wm.edu/etd/1539623553.
Full textSCALAS, MICHELE. "Malware Analysis and Detection with Explainable Machine Learning." Doctoral thesis, Università degli Studi di Cagliari, 2021. http://hdl.handle.net/11584/310630.
Full textNisi, Dario. "Unveiling and mitigating common pitfalls in malware analysis." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS528.
Full textSokol, Maciej, and Joakim Ernstsson. "Dynamic Heuristic Analysis Tool for Detection of Unknown Malware." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12859.
Full textSharif, Monirul Islam. "Robust and efficient malware analysis and host-based monitoring." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/37220.
Full textAlruhaily, Nada Massoud. "Analysis and improvements of behaviour-based malware detection mechanisms." Thesis, University of Birmingham, 2018. http://etheses.bham.ac.uk//id/eprint/8457/.
Full textWrench, Peter Mark. "Detecting derivative malware samples using deobfuscation-assisted similarity analysis." Thesis, Rhodes University, 2016. http://hdl.handle.net/10962/383.
Full textLi, Yuping. "Similarity Based Large Scale Malware Analysis: Techniques and Implications." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7691.
Full textCARA, FABRIZIO. "Analysis and Concealment of Malware in an Adversarial Environment." Doctoral thesis, Università degli Studi di Cagliari, 2022. http://hdl.handle.net/11584/328883.
Full textCase, Andrew. "Detecting Objective-C Malware through Memory Forensics." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2132.
Full textreddy, patlolla pradeep, and pasam raghava reddy. "Modeling The Spread Malware In Computer Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3373.
Full textGaber, Matthew. "Zero-day malware detection: Leveraging dynamic binary instrumentation and transformer models for effective real-world malware classification." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2025. https://ro.ecu.edu.au/theses/2932.
Full textAli-Gombe, Aisha Ibrahim. "Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2290.
Full textDaniš, Daniel. "Detekce malware pomocí analýzy DNS provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255302.
Full textSurovič, Marek. "Statická detekce malware nad LLVM IR." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255427.
Full textKelkar, Soham P. "Detecting Information Leakage in Android Malware Using Static Taint Analysis." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1514202750763563.
Full textTheerthagiri, Dinesh. "Reversing Malware : A detection intelligence with in-depth security analysis." Thesis, Linköping University, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-52058.
Full textHaffejee, Jameel. "An analysis of malware evasion techniques against modern AV engines." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/5821.
Full textXu, Dan. "Analysis of mobile banking malware on the Android operating system." Thesis, Federation University Australia, 2017. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/162600.
Full textQuesinberry, Malora. "An Analysis of Faculty and Staff's Identification of Malware Threats." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3088.
Full textLeslous, Mourad. "Highlight and execute suspicious paths in Android malware." Thesis, Rennes 1, 2018. http://www.theses.fr/2018REN1S090/document.
Full textFernandes, Filho Dario Simões 1986. "BehEMOT = um sistema híbrido de análise de malware." [s.n.], 2011. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275726.
Full textVermeulen, Japie. "An analysis of fusing advanced malware email protection logs, malware intelligence and active directory attributes as an instrument for threat intelligence." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/63922.
Full textPektaş, Abdurrahman. "Behavior based malware classification using online machine learning." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM065/document.
Full textXuan, Chaoting. "Countering kernel malware in virtual execution environments." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31718.
Full textWüchner, Tobias [Verfasser]. "Behavior-based Malware Detection with Quantitative Data Flow Analysis / Tobias Wüchner." Berlin : epubli, 2016. http://d-nb.info/1120172470/34.
Full textRegard, Viktor. "Studying the effectiveness of dynamic analysis for fingerprinting Android malware behavior." Thesis, Linköpings universitet, Databas och informationsteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-163090.
Full textAlMarri, Saeed. "A structured approach to malware detection and analysis in digital forensics investigation." Thesis, University of Bedfordshire, 2017. http://hdl.handle.net/10547/622529.
Full textBrand, Murray. "Analysis avoidance techniques of malicious software." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2010. https://ro.ecu.edu.au/theses/138.
Full textEads, Joshua Michael. "EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination." Diss., Rolla, Mo. : Missouri University of Science and Technology, 2010. http://scholarsmine.mst.edu/thesis/pdf/Eads_09007dcc807a2d75.pdf.
Full textForrester, Jock Ingram. "An exploration into the use of webinjects by financial malware." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1012079.
Full textAndriatsimandefitra, Ratsisahanana Radoniaina. "Caractérisation et détection de malware Android basées sur les flux d'information." Thesis, Supélec, 2014. http://www.theses.fr/2014SUPL0025/document.
Full textTsai, Hung-Shiuan, and 蔡閎亘. "Concise Analysis of Malware Behavior." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/08897330239189878421.
Full textTien, Wei-An, and 田偉安. "Malware Classification via n-gram Analysis." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/32992154303572368533.
Full textSartea, Riccardo. "Intelligent Agents for Active Malware Analysis." Doctoral thesis, 2020. http://hdl.handle.net/11562/1017764.
Full textWu, Chun-chih, and 吳濬志. "Malware Detection Based on Dynamic Behavior Analysis." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/n9898x.
Full text