Journal articles on the topic 'Malware (Software de computador)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malware (Software de computador).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cahyaningrum, Yuliana, and Indrastanti Ratna Widiasari. "Analisis Performa Container Berplatform Docker atas SeranganMalicious Software (Malware)." Jurnal Buana Informatika 11, no. 1 (May 1, 2020): 47. http://dx.doi.org/10.24002/jbi.v11i1.3279.
Full textKalash, Mahmoud, Mrigank Rochan, Noman Mohammed, Neil Bruce, Yang Wang, and Farkhund Iqbal. "A Deep Learning Framework for Malware Classification." International Journal of Digital Crime and Forensics 12, no. 1 (January 2020): 90–108. http://dx.doi.org/10.4018/ijdcf.2020010105.
Full textBavishi, Ujaliben Kalpesh, and Bhavesh Madanlal Jain. "Malware Analysis." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 12 (January 3, 2018): 27. http://dx.doi.org/10.23956/ijarcsse.v7i12.507.
Full textRani, Sangeeta, and Kanwalvir Singh Dhindsa. "Android application security: detecting Android malware and evaluating anti-malware software." International Journal of Internet Technology and Secured Transactions 10, no. 4 (2020): 491. http://dx.doi.org/10.1504/ijitst.2020.10028988.
Full textRani, Sangeeta, and Kanwalvir Singh Dhindsa. "Android application security: detecting Android malware and evaluating anti-malware software." International Journal of Internet Technology and Secured Transactions 10, no. 4 (2020): 491. http://dx.doi.org/10.1504/ijitst.2020.108142.
Full textPranoto, Wisnu. "Malicious Software Analysis." Cyber Security dan Forensik Digital 1, no. 2 (March 12, 2019): 62–66. http://dx.doi.org/10.14421/csecurity.2018.1.2.1374.
Full textChristodorescu, Mihai, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, and Helmut Veith. "Software transformations to improve malware detection." Journal in Computer Virology 3, no. 4 (July 26, 2007): 253–65. http://dx.doi.org/10.1007/s11416-007-0059-8.
Full textZou, Deqing, Yueming Wu, Siru Yang, Anki Chauhan, Wei Yang, Jiangying Zhong, Shihan Dou, and Hai Jin. "IntDroid." ACM Transactions on Software Engineering and Methodology 30, no. 3 (May 2021): 1–32. http://dx.doi.org/10.1145/3442588.
Full textChevychelov, A. V., A. V. Burmistrov, and K. Yu Voyshhev. "Detecting malicious software using machine learning." Issues of radio electronics, no. 11 (November 20, 2019): 42–45. http://dx.doi.org/10.21778/2218-5453-2019-11-42-45.
Full textStone, W. Ross. "When Your Anti-Malware Software Becomes Malware [From the Screen of Stone]." IEEE Antennas and Propagation Magazine 60, no. 4 (August 2018): 144–47. http://dx.doi.org/10.1109/map.2018.2840434.
Full textBhaya, Wesam S., and Mustafa A. Ali. "Review on Malware and Malware Detection Using Data Mining Techniques." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 25, no. 5 (November 29, 2017): 1585–601. http://dx.doi.org/10.29196/jub.v25i5.104.
Full textMutsenek, V. "Destructive software impacts in the context of information confrontation." National Security and Strategic Planning 2021, no. 1 (May 5, 2021): 111–16. http://dx.doi.org/10.37468/2307-1400-2021-1-111-116.
Full textPope, Michael Brian, Merrill Warkentin, and Xin (Robert) Luo. "Evolutionary Malware." International Journal of Wireless Networks and Broadband Technologies 2, no. 3 (July 2012): 52–60. http://dx.doi.org/10.4018/ijwnbt.2012070105.
Full textZhang, Zhigang, Chaowen Chang, Peisheng Han, and Hongtao Zhang. "Packed malware variants detection using deep belief networks." MATEC Web of Conferences 309 (2020): 02002. http://dx.doi.org/10.1051/matecconf/202030902002.
Full textBai, Jin Rong, Shi Guang Mu, and Guo Zhong Zou. "The Application of Machine Learning to Study Malware Evolution." Applied Mechanics and Materials 530-531 (February 2014): 875–78. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.875.
Full textAndrade da Silva, Evandro. "SOFTWARE LIVRE." Revista Dissertar 1, no. 16 e 17 (June 1, 2009): 67–70. http://dx.doi.org/10.24119/16760867ed1894.
Full textGIERSZEWSKI, Tomasz. "Malware - Malicious Software in IT/OT Systems." AUTOMATYKA, ELEKTRYKA, ZAKLOCENIA 7, no. 4(26)2016 (December 31, 2016): 158–69. http://dx.doi.org/10.17274/aez.2016.26.09.
Full textMoussas, Vassilios, and Antonios Andreatos. "Malware Detection Based on Code Visualization and Two-Level Classification." Information 12, no. 3 (March 11, 2021): 118. http://dx.doi.org/10.3390/info12030118.
Full textLiu, Lan, Ryan K. L. Ko, Guangming Ren, and Xiaoping Xu. "Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks." Security and Communication Networks 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/2910310.
Full textZhao, Yanjie, Li Li, Haoyu Wang, Haipeng Cai, Tegawendé F. Bissyandé, Jacques Klein, and John Grundy. "On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection." ACM Transactions on Software Engineering and Methodology 30, no. 3 (May 2021): 1–38. http://dx.doi.org/10.1145/3446905.
Full textRodriguez, Miranda. "All Your IP Are Belong to Us." Texas A&M Law Review 3, no. 3 (May 2016): 663–89. http://dx.doi.org/10.37419/lr.v3.i3.7.
Full textWaliulu, Raditya Faisal, and Teguh Hidayat Iskandar Alam. "Reverse Engineering Analysis Statis Forensic Malware Webc2-Div." Insect (Informatics and Security): Jurnal Teknik Informatika 4, no. 1 (August 23, 2019): 15. http://dx.doi.org/10.33506/insect.v4i1.223.
Full textKong, Deguang, and Guanhua Yan. "Discriminant malware distance learning on structuralinformation for automated malware classification." ACM SIGMETRICS Performance Evaluation Review 41, no. 1 (June 14, 2013): 347–48. http://dx.doi.org/10.1145/2494232.2465531.
Full textSetia, Tesa Pajar, Aldy Putra Aldya, and Nur Widiyasono. "Reverse Engineering untuk Analisis Malware Remote Access Trojan." Jurnal Edukasi dan Penelitian Informatika (JEPIN) 5, no. 1 (April 23, 2019): 40. http://dx.doi.org/10.26418/jp.v5i1.28214.
Full textYang, Hongyu, and Ruiwen Tang. "Power Consumption Based Android Malware Detection." Journal of Electrical and Computer Engineering 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/6860217.
Full textHosseini, Soodeh, Mohammad Abdollahi Azgomi, and Adel Torkaman Rahmani. "Malware propagation modeling considering software diversity and immunization." Journal of Computational Science 13 (March 2016): 49–67. http://dx.doi.org/10.1016/j.jocs.2016.01.002.
Full textJo, Min Jae, and Ji Sun Shin. "MWMon: A Software Defined Network-based Malware Monitor." Journal of the Korea Industrial Information Systems Research 20, no. 5 (October 31, 2015): 37–44. http://dx.doi.org/10.9723/jksiis.2015.20.5.037.
Full textMowbray, Miranda. "Moral Status for Malware! The Difficulty of Defining Advanced Artificial Intelligence." Cambridge Quarterly of Healthcare Ethics 30, no. 3 (June 10, 2021): 517–28. http://dx.doi.org/10.1017/s0963180120001061.
Full textWu, Bozhi, Sen Chen, Cuiyun Gao, Lingling Fan, Yang Liu, Weiping Wen, and Michael R. Lyu. "Why an Android App Is Classified as Malware." ACM Transactions on Software Engineering and Methodology 30, no. 2 (March 2021): 1–29. http://dx.doi.org/10.1145/3423096.
Full textArslan, Recep Sinan. "AndroAnalyzer: android malicious software detection based on deep learning." PeerJ Computer Science 7 (May 10, 2021): e533. http://dx.doi.org/10.7717/peerj-cs.533.
Full textNguyen, Khoi Tan. "DEVELOPING A MALWARE ANALYSIS SYSTEM ON DISTRIBUTED ENVIRONMENT." Journal of Science and Technology: Issue on Information and Communications Technology 3, no. 2 (December 31, 2017): 41. http://dx.doi.org/10.31130/jst.2017.52.
Full textHeiser, Jay G. "Understanding today's malware." Information Security Technical Report 9, no. 2 (April 2004): 47–64. http://dx.doi.org/10.1016/s1363-4127(04)00025-1.
Full textAnscombe, T. "Mobile Malware Menace." ITNOW 56, no. 1 (February 24, 2014): 14–15. http://dx.doi.org/10.1093/itnow/bwu006.
Full textBarbosa, Bernardo Bucher B., and Júlio César Silva. "Interação Humano - Computador usando Visão Computacional." Revista Eletrônica TECCEN 2, no. 1 (April 1, 2009): 09. http://dx.doi.org/10.21727/198409932009.teccen.v2i1.09-16.
Full textBarbosa, Bernardo Bucher B., and Júlio César Silva. "Interação Humano - Computador usando Visão Computacional." Revista Eletrônica TECCEN 2, no. 1 (October 3, 2016): 09. http://dx.doi.org/10.21727/teccen.v2i1.223.
Full textBarbosa, Bernardo Bucher B., and Júlio César Silva. "Interação Humano - Computador usando Visão Computacional." Revista Eletrônica TECCEN 2, no. 1 (April 1, 2009): 09. http://dx.doi.org/10.21727/teccen.v2i1.71.
Full textBasole, Samanvitha, Fabio Di Troia, and Mark Stamp. "Multifamily malware models." Journal of Computer Virology and Hacking Techniques 16, no. 1 (January 10, 2020): 79–92. http://dx.doi.org/10.1007/s11416-019-00345-8.
Full textCrutchfield, Steve. "Outsmarting the New Malware." EDPACS 33, no. 9 (March 2006): 18–20. http://dx.doi.org/10.1201/1079.07366981/45851.33.9.20060301/92239.3.
Full textPlucar, Jan, Jiří Frank, Daniel Walter, and Ivan Zelinka. "Intelligent Malware - Trends and Possibilities." MENDEL 27, no. 1 (June 21, 2021): 18–22. http://dx.doi.org/10.13164/mendel.2021.1.018.
Full textSong, Fu, and Tayssir Touili. "Pushdown model checking for malware detection." International Journal on Software Tools for Technology Transfer 16, no. 2 (September 30, 2013): 147–73. http://dx.doi.org/10.1007/s10009-013-0290-1.
Full textMuhtadi, Adib Fakhri, and Ahmad Almaarif. "Analysis of Malware Impact on Network Traffic using Behavior-based Detection Technique." International Journal of Advances in Data and Information Systems 1, no. 1 (April 1, 2020): 17–25. http://dx.doi.org/10.25008/ijadis.v1i1.14.
Full textMuhtadi, Adib Fakhri, and Ahmad Almaarif. "Analysis of Malware Impact on Network Traffic using Behavior-based Detection Technique." International Journal of Advances in Data and Information Systems 1, no. 1 (March 9, 2020): 17–25. http://dx.doi.org/10.25008/ijadis.v1i1.8.
Full textAl-Marghilani, A. "Comprehensive Analysis of IoT Malware Evasion Techniques." Engineering, Technology & Applied Science Research 11, no. 4 (August 21, 2021): 7495–500. http://dx.doi.org/10.48084/etasr.4296.
Full textMarcello, Mario. "Collecting Malware in Swiss German University with Low Energy and Cost Computer." Journal of Applied Information, Communication and Technology 5, no. 2 (October 28, 2018): 85–91. http://dx.doi.org/10.33555/ejaict.v5i2.57.
Full textAshik, Mathew, A. Jyothish, S. Anandaram, P. Vinod, Francesco Mercaldo, Fabio Martinelli, and Antonella Santone. "Detection of Malicious Software by Analyzing Distinct Artifacts Using Machine Learning and Deep Learning Algorithms." Electronics 10, no. 14 (July 15, 2021): 1694. http://dx.doi.org/10.3390/electronics10141694.
Full textBai, Jinrong, Qibin Shi, and Shiguang Mu. "A Malware and Variant Detection Method Using Function Call Graph Isomorphism." Security and Communication Networks 2019 (September 22, 2019): 1–12. http://dx.doi.org/10.1155/2019/1043794.
Full textRossinskaya, Elena, and Igor Ryadovskiy. "The Concept of Malware as a Means of Committing Computer Crimes: Classification and Methods of Illegal Use." Russian Journal of Criminology 14, no. 5 (November 20, 2020): 699–709. http://dx.doi.org/10.17150/2500-4255.2020.14(5).699-709.
Full textMing, Jiang, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu, and Bing Mao. "Impeding behavior-based malware analysis via replacement attacks to malware specifications." Journal of Computer Virology and Hacking Techniques 13, no. 3 (May 31, 2016): 193–207. http://dx.doi.org/10.1007/s11416-016-0281-3.
Full textOlawale Surajudeen, Adebayo. "Malware Detection, Supportive Software Agents and Its Classification Schemes." International Journal of Network Security & Its Applications 4, no. 6 (November 30, 2012): 33–49. http://dx.doi.org/10.5121/ijnsa.2012.4603.
Full textBrody, Richard G., Harold U. Chang, and Erich S. Schoenberg. "Malware at its worst: death and destruction." International Journal of Accounting & Information Management 26, no. 4 (October 1, 2018): 527–40. http://dx.doi.org/10.1108/ijaim-04-2018-0046.
Full text