Academic literature on the topic 'Portable Executable'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Portable Executable.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Portable Executable"
Li, Yang, Ye Liang, and Jing Zhang Liang. "Applied-Information Technology with Trojan Horse Detection Method Based on C5.0 Decision Tree." Applied Mechanics and Materials 540 (April 2014): 439–42. http://dx.doi.org/10.4028/www.scientific.net/amm.540.439.
Full textDendere, Tanatswa Ruramai, and Avinash Singh. "Ransomware Detection Using Portable Executable Imports." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 66–74. http://dx.doi.org/10.34190/iccws.19.1.2031.
Full textGritzalis, Stefanos, George Aggelis, and Diomidis Spinellis. "Architectures for secure portable executable content." Internet Research 9, no. 1 (1999): 16–24. http://dx.doi.org/10.1108/10662249910251273.
Full textTuan, Nguyen Kim, Nguyen Hoang Ha, and Tran Truong Thien Nguyen. "DETECTING MALWARE IN PORTABLE EXECUTABLE FILES USING MACHINE LEARNING APPROACH." International Journal of Network Security & Its Applications (IJNSA) 14, no. 3 (2022): 11–17. https://doi.org/10.5281/zenodo.6629970.
Full textAhmed, Eman, Amin A. Sorrour, Mohamed A. Sobh, and Ayman M. Bahaa-Eldin. "A Cloud-based Malware Detection Framework." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 2 (2017): 113. http://dx.doi.org/10.3991/ijim.v11i2.6577.
Full textAlqahtani, Ali, Sumayya Azzony, Leen Alsharafi, and Maha Alaseri. "Web-Based Malware Detection System Using Convolutional Neural Network." Digital 3, no. 3 (2023): 273–85. http://dx.doi.org/10.3390/digital3030017.
Full textDieta Wahyu Asry, Eko Siswanto, Dendy Kurniawan, and Haris Ihsanil Huda. "Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable." Teknik: Jurnal Ilmu Teknik dan Informatika 3, no. 1 (2023): 19–34. http://dx.doi.org/10.51903/teknik.v3i1.325.
Full textZhang, Shuhui, Changdong Hu, Lianhai Wang, Miodrag J. Mihaljevic, Shujiang Xu, and Tian Lan. "A Malware Detection Approach Based on Deep Learning and Memory Forensics." Symmetry 15, no. 3 (2023): 758. http://dx.doi.org/10.3390/sym15030758.
Full textTayyab, Umm-e.-Hani, Faiza Babar Khan, Asifullah Khan, Muhammad Hanif Durad, Farrukh Aslam Khan, and Aftab Ali. "ISAnWin: inductive generalized zero-shot learning using deep CNN for malware detection across windows and android platforms." PeerJ Computer Science 10 (December 23, 2024): e2604. https://doi.org/10.7717/peerj-cs.2604.
Full textKhammassi, N., I. Ashraf, J. V. Someren, et al. "OpenQL: A Portable Quantum Programming Framework for Quantum Accelerators." ACM Journal on Emerging Technologies in Computing Systems 18, no. 1 (2022): 1–24. http://dx.doi.org/10.1145/3474222.
Full textDissertations / Theses on the topic "Portable Executable"
Namanya, Anitta P., Irfan U. Awan, J. P. Disso, and M. Younas. "Similarity hash based scoring of portable executable files for efficient malware detection in IoT." Elsevier, 2019. http://hdl.handle.net/10454/17168.
Full textNamanya, Anitta P. "A Heuristic Featured Based Quantification Framework for Efficient Malware Detection. Measuring the Malicious intent of a file using anomaly probabilistic scoring and evidence combinational theory with fuzzy hashing for malware detection in Portable Executable files." Thesis, University of Bradford, 2016. http://hdl.handle.net/10454/15863.
Full textChhabra, Dalbir Kaur R. "Feature selection and clustering for malicious and benign software characterization." ScholarWorks@UNO, 2014. http://scholarworks.uno.edu/td/1864.
Full textMirza, Qublai K. A. "A Cloud-Based Intelligent and Energy Efficient Malware Detection Framework. A Framework for Cloud-Based, Energy Efficient, and Reliable Malware Detection in Real-Time Based on Training SVM, Decision Tree, and Boosting using Specified Heuristics Anomalies of Portable Executable Files." Thesis, University of Bradford, 2017. http://hdl.handle.net/10454/16043.
Full textLai, Qinan. "Enabling high quality executable domain specific language specification." Thesis, University of Manchester, 2015. https://www.research.manchester.ac.uk/portal/en/theses/enabling-high-quality-executable-domain-specific-language-specification(bc6a9e87-b624-4072-9430-fbacdaac8289).html.
Full textPospíšil, Petr. "Knihovna pro efektivní záznam videa v 3D aplikaci." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236587.
Full textŠálek, Jiří. "Obrana programů před reverzním inženýrstvím." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-431853.
Full textBook chapters on the topic "Portable Executable"
Mohanta, Abhijit, and Anoop Saldanha. "Virtual Memory and the Portable Executable (PE) File." In Malware Analysis and Detection Engineering. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6193-4_4.
Full textJadvani, Nisarg, Mohit Agarwal, and Kavisankar Leelasankar. "Malware Detection Based on Portable Executable File Features." In International Conference on Computing, Communication, Electrical and Biomedical Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-86165-0_31.
Full textKumar, Avinash, and Meena Chaudhary. "Portable Executable Analysis for Malware Detection for Reducing Risk." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-82377-0_46.
Full textAwan, Saba, and Nazar Abbas Saqib. "Detection of Malicious Executables Using Static and Dynamic Features of Portable Executable (PE) File." In Lecture Notes in Computer Science. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49145-5_6.
Full textEl Mouhtadi, Walid, Yassine Maleh, and Soufyane Mounir. "Machine Learning Techniques for Enhanced Malware Detection in Portable Executable Files." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-88653-9_74.
Full textTian, Zuwei, and Hengfu Yang. "Software Information Hiding Algorithm Based on Import Table of Portable Executable File." In Advances in Artificial Intelligence and Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78621-2_24.
Full textBelaoued, Mohamed, Bouchra Guelib, Yasmine Bounaas, Abdelouahid Derhab, and Mahmoud Boufaida. "Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers." In Machine Learning for Networking. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19945-6_11.
Full textNanaiah, Nachappa Muckatira, Amit Gantra, and Trapty Agarwal. "Diagnosis and exploration of portable executable (PE) malware using XGboost and other ML classifiers." In Sustainability in Digital Transformation Era: Driving Innovative & Growth. CRC Press, 2024. http://dx.doi.org/10.1201/9781003534136-20.
Full textKaminsky, Dan. "Portable Executable and Executable and Linking Formats." In Reverse Engineering Code with IDA Pro. Elsevier, 2008. http://dx.doi.org/10.1016/b978-1-59749-237-9.00003-x.
Full textAuty, D., A. Burns, C. W. McKay, C. Randall, and P. Rogers. "A Portable Common Executable Environment for Ada." In Distributed Ada: Developments and Experiences. Cambridge University Press, 1990. http://dx.doi.org/10.1017/cbo9780511526541.013.
Full textConference papers on the topic "Portable Executable"
Vashishtha, Lalit Kumar, Ashish Kumar, and Kakali Chatterjee. "Machine Learning Approaches for Malware Detection in Cloud Portable Executable Files." In 2024 IEEE Region 10 Symposium (TENSYMP). IEEE, 2024. http://dx.doi.org/10.1109/tensymp61132.2024.10752287.
Full textBalakrishnan, S., S. Leelavathy, Sunil Kumar RM, and S. Simonthomas. "Machine Learning based Portable Executable Malware and DDoS Attacks Detection in IoT Networks." In 2025 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2025. https://doi.org/10.1109/iciccs65191.2025.10984796.
Full textSathish, A., N.Babu, M. Bhavani, K. Divya, B. Jhoshna, and T. Hemavathi. "Adaptive Malware Detection In Windows Portable Executables (Wpes)." In 2024 4th Asian Conference on Innovation in Technology (ASIANCON). IEEE, 2024. https://doi.org/10.1109/asiancon62057.2024.10838133.
Full textWang, Tzu-Yen, Chin-Hsiung Wu, and Chu-Cheng Hsieh. "Detecting Unknown Malicious Executables Using Portable Executable Headers." In 2009 Fifth International Joint Conference on INC, IMS and IDC. IEEE, 2009. http://dx.doi.org/10.1109/ncm.2009.385.
Full textSantos, Rico S., and Enrique D. Festijo. "Generating Features of Windows Portable Executable Files for Static Analysis using Portable Executable Reader Module (PEFile)." In 2021 4th International Conference of Computer and Informatics Engineering (IC2IE). IEEE, 2021. http://dx.doi.org/10.1109/ic2ie53219.2021.9649225.
Full textKumar, Ajit, and G. Aghila. "Portable executable scoring: What is your malicious score?" In 2014 International Conference on Science Engineering and Management Research (ICSEMR). IEEE, 2014. http://dx.doi.org/10.1109/icsemr.2014.7043649.
Full textYousaf, M. Shahid, Muhammad Hanif Durad, and Maleeha Ismail. "Implementation of Portable Executable File Analysis Framework (PEFAF)." In 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST - 2019). IEEE, 2019. http://dx.doi.org/10.1109/ibcast.2019.8667202.
Full textSantos, Rico S., and Enrique D. Festijo. "Classifying Portable Executable Malware Using Deep Neural Decision Tree." In 2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom). IEEE, 2022. http://dx.doi.org/10.1109/cyberneticscom55287.2022.9865320.
Full textKamble, Manojkumar T., and Sridevi. "Feature Extraction and Analysis of Portable Executable Malicious File." In 2022 Second International Conference on Computer Science, Engineering and Applications (ICCSEA). IEEE, 2022. http://dx.doi.org/10.1109/iccsea54677.2022.9936121.
Full textMello, Alexandre, Vitor Gama Lemos, Flávio Barbosa, and Emílio Simoni. "Malware identification on Portable Executable files using Opcodes Sequence." In Congresso Brasileiro de Inteligência Computacional. SBIC, 2023. http://dx.doi.org/10.21528/cbic2023-006.
Full text