Academic literature on the topic 'Malware persistence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malware persistence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malware persistence"
Gittins, Zane, and Michael Soltys. "Malware Persistence Mechanisms." Procedia Computer Science 176 (2020): 88–97. http://dx.doi.org/10.1016/j.procs.2020.08.010.
Full textShang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.
Full textXiao, Kaiming, Cheng Zhu, Junjie Xie, Yun Zhou, Xianqiang Zhu, and Weiming Zhang. "Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework." Entropy 22, no. 8 (2020): 894. http://dx.doi.org/10.3390/e22080894.
Full textBibi, Iram, Adnan Akhunzada, Jahanzaib Malik, Muhammad Khurram Khan, and Muhammad Dawood. "Secure Distributed Mobile Volunteer Computing with Android." ACM Transactions on Internet Technology 22, no. 1 (2022): 1–21. http://dx.doi.org/10.1145/3428151.
Full textWaliulu, Raditya Faisal, and Teguh Hidayat Iskandar Alam. "Reverse Engineering Analysis Statis Forensic Malware Webc2-Div." Insect (Informatics and Security): Jurnal Teknik Informatika 4, no. 1 (2019): 15. http://dx.doi.org/10.33506/insect.v4i1.223.
Full textLaurenza, Giuseppe, Riccardo Lazzeretti, and Luca Mazzotti. "Malware Triage for Early Identification of Advanced Persistent Threat Activities." Digital Threats: Research and Practice 1, no. 3 (2020): 1–17. http://dx.doi.org/10.1145/3386581.
Full textHofer-Schmitz, Katharina, Ulrike Kleb, and Branka Stojanović. "The Influences of Feature Sets on the Detection of Advanced Persistent Threats." Electronics 10, no. 6 (2021): 704. http://dx.doi.org/10.3390/electronics10060704.
Full textMárquez Díaz, Jairo Eduardo. "Armas cibernéticas. Malware inteligente para ataques dirigidos." Ingenierías USBMed 8, no. 2 (2017): 48–57. http://dx.doi.org/10.21500/20275846.2955.
Full textLi, Shudong, Qianqing Zhang, Xiaobo Wu, Weihong Han, and Zhihong Tian. "Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques." Security and Communication Networks 2021 (September 6, 2021): 1–12. http://dx.doi.org/10.1155/2021/9396141.
Full textLIU, Jing, Pei Dai XIE, Meng Zhu LIU, and Yong Jun WANG. "Having an Insight into Malware Phylogeny: Building Persistent Phylogeny Tree of Families." IEICE Transactions on Information and Systems E101.D, no. 4 (2018): 1199–202. http://dx.doi.org/10.1587/transinf.2017edl8172.
Full textDissertations / Theses on the topic "Malware persistence"
Webb, Matthew S. "Evaluating tool based automated malware analysis through persistence mechanism detection." Thesis, Kansas State University, 2018. http://hdl.handle.net/2097/38783.
Full textLoreti, Ludovico. "Pass The Hash attack. Panoramica, sperimentazione ed analisi." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17297/.
Full textGhafir, Ibrahim, M. Hammoudeh, V. Prenosil, et al. "Detection of advanced persistent threat using machine-learning correlation analysis." 2018. http://hdl.handle.net/10454/17614.
Full textBook chapters on the topic "Malware persistence"
O’Leary, Mike. "Malware and Persistence." In Cyber Operations. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4294-0_11.
Full textO’Leary, Mike. "Malware and Persistence." In Cyber Operations. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0457-3_10.
Full textMohanta, Abhijit, and Anoop Saldanha. "Persistence Mechanisms." In Malware Analysis and Detection Engineering. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6193-4_8.
Full textBrierley, Calvin, Jamie Pont, Budi Arief, David J. Barnes, and Julio Hernandez-Castro. "Persistence in Linux-Based IoT Malware." In Secure IT Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70852-8_1.
Full textLeguesse, Yonas, Mark Vella, Christian Colombo, and Julio Hernandez-Castro. "Reducing the Forensic Footprint with Android Accessibility Attacks." In Security and Trust Management. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59817-4_2.
Full textSteffens, Timo. "Analysis of Malware." In Attribution of Advanced Persistent Threats. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-61313-9_3.
Full textSai Charan, P. V., P. Mohan Anand, and Sandeep K. Shukla. "DMAPT: Study of Data Mining and Machine Learning Techniques in Advanced Persistent Threat Attribution and Detection." In Artificial Intelligence. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.99291.
Full textNishani, Lediona. "Review on Security Threats for Mobile Devices and Significant Countermeasures on Securing Android Mobiles." In Advances in Business Information Systems and Analytics. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8841-4.ch001.
Full textConference papers on the topic "Malware persistence"
Botacin, Marcus, André Grégio та Paulo De Geus. "Malware Variants Identification in Practice". У Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13960.
Full textLi, Frankie, Anthony Lai, and Ddl Ddl. "Evidence of Advanced Persistent Threat: A case study of malware for political espionage." In 2011 6th International Conference on Malicious and Unwanted Software (MALWARE). IEEE, 2011. http://dx.doi.org/10.1109/malware.2011.6112333.
Full textVogl, Sebastian, Jonas Pfoh, Thomas Kittel, and Claudia Eckert. "Persistent Data-only Malware: Function Hooks without Code." In Network and Distributed System Security Symposium. Internet Society, 2014. http://dx.doi.org/10.14722/ndss.2014.23019.
Full textKohout, Jan, and Tomas Pevny. "Unsupervised detection of malware in persistent web traffic." In ICASSP 2015 - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2015. http://dx.doi.org/10.1109/icassp.2015.7178272.
Full text