Contents
Academic literature on the topic 'Obfuscated computer virus'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Obfuscated computer virus.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Obfuscated computer virus"
Tan, Hui Xin, Ismail Ismahani, and Mohammed Khammas Ban. "Obfuscated computer virus detection using machine learning algorithm." Bulletin of Electrical Engineering and Informatics 8, no. 4 (2019): 1383–91. https://doi.org/10.11591/eei.v8i4.1584.
Full textLi, Qi Lin, Zong Qu Zhao, and Jun Feng Wang. "Research of Computer Virus Detection Technology Based on the Virtualization Platform." Applied Mechanics and Materials 441 (December 2013): 405–8. http://dx.doi.org/10.4028/www.scientific.net/amm.441.405.
Full textTang, Ke, Zheng Shan, Chunyan Zhang, Lianqiu Xu, Meng Qiao, and Fudong Liu. "DFSGraph: Data Flow Semantic Model for Intermediate Representation Programs Based on Graph Network." Electronics 11, no. 19 (2022): 3230. http://dx.doi.org/10.3390/electronics11193230.
Full textGunawan, Indra. "Analisis Malware Botnet Proteus Pendekatan Static dan Dinamic." SIMETRIS 15, no. 1 (2021): 12–17. http://dx.doi.org/10.51901/simetris.v15i01.172.
Full textNdibanje, Bruce, Ki Kim, Young Kang, Hyun Kim, Tae Kim, and Hoon Lee. "Cross-Method-Based Analysis and Classification of Malicious Behavior by API Calls Extraction." Applied Sciences 9, no. 2 (2019): 239. http://dx.doi.org/10.3390/app9020239.
Full textXin, Tan Hui, Ismahani Ismail, and Ban Mohammed Khammas. "Obfuscated computer virus detection using machine learning algorithm." Bulletin of Electrical Engineering and Informatics 8, no. 4 (2019). http://dx.doi.org/10.11591/eei.v8i4.1584.
Full textMimura, Mamoru, and Ryo Ito. "Applying NLP techniques to malware detection in a practical environment." International Journal of Information Security, June 6, 2021. http://dx.doi.org/10.1007/s10207-021-00553-8.
Full text