Results 91 to 100 of about 81,305 (190)

CSMC: A Secure and Efficient Visualized Malware Classification Method Inspired by Compressed Sensing

open access: yesSensors
With the rapid development of the Internet of Things (IoT), the sophistication and intelligence of sensors are continually evolving, playing increasingly important roles in smart homes, industrial automation, and remote healthcare.
Wei Wu   +3 more
doaj   +1 more source

HoneyBow:an automated malware collection tool based on the high-interaction honeypot principle

open access: yesTongxin xuebao, 2007
Malware has become one of the severest threats to the public Internet.To deal with the malware breakout ef-fectively as early as possible,an automated malware collection solution must be implemented as a precondition.An automated malware collection tool ...
ZHUGE Jian-wei1   +5 more
doaj   +2 more sources

Homology analysis of malware based on graph

open access: yesTongxin xuebao, 2017
Malware detection and homology analysis has been the hotspot of malware analysis.API call graph of malware can represent the behavior of it.Because of the subgraph isomorphism algorithm has high complexity,the analysis of malware based on the graph ...
Bing-lin ZHAO   +4 more
doaj   +2 more sources

Malware

open access: yes, 2016
Robert H. Sloan, Richard Warner
  +4 more sources

WSN malware infection model based on cellular automaton and static Bayesian game

open access: yesDianxin kexue, 2019
The theoretical model for the malware infection in wireless sensor networks (WSN) based on cellular automaton and static Bayesian game was studied.Firstly,the malware infection model of WSN based on cellular automaton was built.Secondly,the malware ...
Hong ZHANG   +3 more
doaj  

Few-shot android malware classification with quantum-enhanced prototypical learning and drift detection. [PDF]

open access: yesSci Rep
Tawfik M   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy