Academic literature on the topic 'Malware fingerprint'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malware fingerprint.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malware fingerprint"
Botas, Alvaro, Ricardo J. Rodríguez, Vicente Matellan, Juan F. Garcia, M. T. Trobajo, and Miguel V. Carriegos. "On Fingerprinting of Public Malware Analysis Services." Logic Journal of the IGPL 28, no. 4 (2019): 473–86. http://dx.doi.org/10.1093/jigpal/jzz050.
Full textAhmed, Hashem El Fiky. "Visual Detection for Android Malware using Deep Learning." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 1 (2020): 152–56. https://doi.org/10.35940/ijitee.A8132.1110120.
Full textSingh, Jaiteg, Deepak Thakur, Farman Ali, Tanya Gera, and Kyung Sup Kwak. "Deep Feature Extraction and Classification of Android Malware Images." Sensors 20, no. 24 (2020): 7013. http://dx.doi.org/10.3390/s20247013.
Full textZhao, Jianming, Ziwen Jin, Peng Zeng, Chuan Sheng, and Tianyu Wang. "An Anomaly Detection Method for Oilfield Industrial Control Systems Fine-Tuned Using the Llama3 Model." Applied Sciences 14, no. 20 (2024): 9169. http://dx.doi.org/10.3390/app14209169.
Full textThomson, Amanda, Leandros Maglaras, and Naghmeh Moradpoor. "A Novel TLS-Based Fingerprinting Approach That Combines Feature Expansion and Similarity Mapping." Future Internet 17, no. 3 (2025): 120. https://doi.org/10.3390/fi17030120.
Full textKlopper, Christiaan, and Jan Eloff. "Fingerprinting Network Sessions for the Discovery of Cyber Threats." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 171–80. http://dx.doi.org/10.34190/iccws.18.1.1027.
Full textBiałczak, Piotr, and Wojciech Mazurczyk. "Hfinger: Malware HTTP Request Fingerprinting." Entropy 23, no. 5 (2021): 507. http://dx.doi.org/10.3390/e23050507.
Full textNegera, Worku Gachena, Friedhelm Schwenker, Taye Girma Debelee, Henock Mulugeta Melaku, and Degaga Wolde Feyisa. "Lightweight Model for Botnet Attack Detection in Software Defined Network-Orchestrated IoT." Applied Sciences 13, no. 8 (2023): 4699. http://dx.doi.org/10.3390/app13084699.
Full textRafrastara, Fauzi Adi, Catur Supriyanto, Afinzaki Amiral, Syafira Rosa Amalia, Muhammad Daffa Al Fahreza, and Foez Ahmed. "Performance Comparison of k-Nearest Neighbor Algorithm with Various k Values and Distance Metrics for Malware Detection." JURNAL MEDIA INFORMATIKA BUDIDARMA 8, no. 1 (2024): 450. http://dx.doi.org/10.30865/mib.v8i1.6971.
Full textAlrabaee, Saed, Mourad Debbabi, and Lingyu Wang. "A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features." ACM Computing Surveys 55, no. 1 (2023): 1–41. http://dx.doi.org/10.1145/3486860.
Full textDissertations / Theses on the topic "Malware fingerprint"
Varga, Adam. "Identifikace a charakterizace škodlivého chování v grafech chování." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442388.
Full textBooks on the topic "Malware fingerprint"
VERMA, Priyanka, and Komaljeet KAUR. Analysis of Fingerprints and Palmprints Pattern of Identical Twins in Malwa Population, Punjab. Independently Published, 2018.
Find full textBook chapters on the topic "Malware fingerprint"
Botas, Álvaro, Ricardo J. Rodríguez, Vicente Matellán, and Juan F. García. "Empirical Study to Fingerprint Public Malware Analysis Services." In International Joint Conference SOCO’17-CISIS’17-ICEUTE’17 León, Spain, September 6–8, 2017, Proceeding. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67180-2_57.
Full textBotvinnik, Marina, Tomer Laor, Thomas Rokicki, Clémentine Maurice, and Yossi Oren. "The Finger in the Power: How to Fingerprint PCs by Monitoring Their Power Consumption." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35504-2_2.
Full textPfister, Moritz, Robert Michael, Max Boll, Cosima Körfer, Konrad Rieck, and Daniel Arp. "Listening Between the Bits: Privacy Leaks in Audio Fingerprints." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-64171-8_10.
Full textHoffmann, Johannes, Stephan Neumann, and Thorsten Holz. "Mobile Malware Detection Based on Energy Fingerprints — A Dead End?" In Research in Attacks, Intrusions, and Defenses. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41284-4_18.
Full textErichson, N. Benjamin, Dane Taylor, Qixuan Wu, and Michael W. Mahoney. "Noise-Response Analysis of Deep Neural Networks Quantifies Robustness and Fingerprints Structural Malware." In Proceedings of the 2021 SIAM International Conference on Data Mining (SDM). Society for Industrial and Applied Mathematics, 2021. http://dx.doi.org/10.1137/1.9781611976700.12.
Full textConference papers on the topic "Malware fingerprint"
Matoušek, Petr, Ondřej Ryšavý, and Ivana Burgetová. "Experience Report: Using JA4+ Fingerprints for Malware Detection in Encrypted Traffic." In 2024 20th International Conference on Network and Service Management (CNSM). IEEE, 2024. https://doi.org/10.23919/cnsm62983.2024.10814358.
Full textXiaofang, Ban, Chen Li, Hu Weihua, and Wu Qu. "Malware variant detection using similarity search over content fingerprint." In 2014 26th Chinese Control And Decision Conference (CCDC). IEEE, 2014. http://dx.doi.org/10.1109/ccdc.2014.6852216.
Full textTao, Lei, and Liang Gu. "An improved fingerprint matching algorithm to detect malware encrypted traffic based on weighted Bayes." In International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022), edited by Xiaohao Cai and Wei Wei. SPIE, 2022. http://dx.doi.org/10.1117/12.2635865.
Full text