Journal articles on the topic 'Malware persistence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 27 journal articles for your research on the topic 'Malware persistence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gittins, Zane, and Michael Soltys. "Malware Persistence Mechanisms." Procedia Computer Science 176 (2020): 88–97. http://dx.doi.org/10.1016/j.procs.2020.08.010.
Full textShang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.
Full textXiao, Kaiming, Cheng Zhu, Junjie Xie, Yun Zhou, Xianqiang Zhu, and Weiming Zhang. "Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework." Entropy 22, no. 8 (2020): 894. http://dx.doi.org/10.3390/e22080894.
Full textBibi, Iram, Adnan Akhunzada, Jahanzaib Malik, Muhammad Khurram Khan, and Muhammad Dawood. "Secure Distributed Mobile Volunteer Computing with Android." ACM Transactions on Internet Technology 22, no. 1 (2022): 1–21. http://dx.doi.org/10.1145/3428151.
Full textWaliulu, Raditya Faisal, and Teguh Hidayat Iskandar Alam. "Reverse Engineering Analysis Statis Forensic Malware Webc2-Div." Insect (Informatics and Security): Jurnal Teknik Informatika 4, no. 1 (2019): 15. http://dx.doi.org/10.33506/insect.v4i1.223.
Full textLaurenza, Giuseppe, Riccardo Lazzeretti, and Luca Mazzotti. "Malware Triage for Early Identification of Advanced Persistent Threat Activities." Digital Threats: Research and Practice 1, no. 3 (2020): 1–17. http://dx.doi.org/10.1145/3386581.
Full textHofer-Schmitz, Katharina, Ulrike Kleb, and Branka Stojanović. "The Influences of Feature Sets on the Detection of Advanced Persistent Threats." Electronics 10, no. 6 (2021): 704. http://dx.doi.org/10.3390/electronics10060704.
Full textMárquez Díaz, Jairo Eduardo. "Armas cibernéticas. Malware inteligente para ataques dirigidos." Ingenierías USBMed 8, no. 2 (2017): 48–57. http://dx.doi.org/10.21500/20275846.2955.
Full textLi, Shudong, Qianqing Zhang, Xiaobo Wu, Weihong Han, and Zhihong Tian. "Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques." Security and Communication Networks 2021 (September 6, 2021): 1–12. http://dx.doi.org/10.1155/2021/9396141.
Full textLIU, Jing, Pei Dai XIE, Meng Zhu LIU, and Yong Jun WANG. "Having an Insight into Malware Phylogeny: Building Persistent Phylogeny Tree of Families." IEICE Transactions on Information and Systems E101.D, no. 4 (2018): 1199–202. http://dx.doi.org/10.1587/transinf.2017edl8172.
Full textNiu, Weina, Xiaosong Zhang, GuoWu Yang, Jianan Zhu, and Zhongwei Ren. "Identifying APT Malware Domain Based on Mobile DNS Logging." Mathematical Problems in Engineering 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/4916953.
Full textKim, Dohoon, Donghee Choi, and Jonghyun Jin. "Method for Detecting Core Malware Sites Related to Biomedical Information Systems." Computational and Mathematical Methods in Medicine 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/756842.
Full textSarkunavathi, A., and V. Srinivasan. "A Detailed Study on Advanced Persistent Threats: A Sophisticated Threat." Asian Journal of Computer Science and Technology 7, S1 (2018): 90–95. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1797.
Full textJeng, Tzung-Han, Yi-Ming Chen, Chien-Chih Chen, and Chuan-Chiang Huang. "MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection." Security and Communication Networks 2020 (October 29, 2020): 1–20. http://dx.doi.org/10.1155/2020/8841544.
Full textS, Preetha, P. Lalasa, and Pradeepa R. "A Comprehensive Overview on Cybersecurity: Threats and Attacks." Regular issue 10, no. 8 (2021): 98–106. http://dx.doi.org/10.35940/ijitee.h9242.0610821.
Full textCRISTEA, Lavinia Mihaela. "Risks Associated with Threats Related to Disruptive Technologies in the Current Financial Systems Context." Audit Financiar 19, no. 161 (2021): 119–29. http://dx.doi.org/10.20869/auditf/2021/161/002.
Full textEt.al, G. Swarnalatha. "Detect and Classify the Unpredictable Cyber-Attacks by using DNN Model." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 74–81. http://dx.doi.org/10.17762/turcomat.v12i6.1269.
Full textPark, Jong Hyuk. "Symmetry-Adapted Machine Learning for Information Security." Symmetry 12, no. 6 (2020): 1044. http://dx.doi.org/10.3390/sym12061044.
Full textHwang, Chanwoong, Hyosik Kim, Hooki Lee, and Taejin Lee. "Effective DGA-Domain Detection and Classification with TextCNN and Additional Features." Electronics 9, no. 7 (2020): 1070. http://dx.doi.org/10.3390/electronics9071070.
Full textFeng, Bo, Qiang Li, Yuede Ji, Dong Guo, and Xiangyu Meng. "Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users." Security and Communication Networks 2019 (July 11, 2019): 1–14. http://dx.doi.org/10.1155/2019/3053418.
Full text"Exploring the API Calls for Malware Behavior Detection using Concordance and Document Frequency." International Journal of Engineering and Advanced Technology 8, no. 6 (2019): 4991–97. http://dx.doi.org/10.35940/ijeat.f9144.088619.
Full textWaliulu, Raditya Faisal. "Reverse Engineering Reverse Engineering Analysis Forensic Malware WEBC2-Div." Journal of Informatics, Information System, Software Engineering and Applications (INISTA) 1, no. 1 (2018). http://dx.doi.org/10.20895/inista.v1i1.10.
Full textWaliulu, Raditya Faisal, and Teguh Hidayat Iskandar Alam. "REVERSE ENGINEERING ANALYSIS FORENSIC MALWARE WEBC2-DIV." KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) 2, no. 1 (2018). http://dx.doi.org/10.30865/komik.v2i1.902.
Full textChen, Weixiang, Xiaohan Helu, Chengjie Jin, et al. "Advanced persistent threat organization identification based on software gene of malware." Transactions on Emerging Telecommunications Technologies 31, no. 12 (2020). http://dx.doi.org/10.1002/ett.3884.
Full textGriscioli, Federico, and Maurizio Pizzonia. "USBCaptchaIn: Preventing (un)conventional attacks from promiscuously used USB devices in industrial control systems1." Journal of Computer Security, December 7, 2020, 1–26. http://dx.doi.org/10.3233/jcs-191404.
Full textRamadhan, Iqbal. "Building Cybersecurity Regulation in Southeast Asia: A Challenge for the Association of Southeast Asian Nations (ASEAN)." Journal of Social and Political Sciences 3, no. 4 (2020). http://dx.doi.org/10.31014/aior.1991.03.04.230.
Full textAlghamdi, Waleed, and Michael Schukat. "Precision time protocol attack strategies and their resistance to existing security extensions." Cybersecurity 4, no. 1 (2021). http://dx.doi.org/10.1186/s42400-021-00080-y.
Full text