Results 141 to 150 of about 81,305 (190)

Malware

2007
The Trojan horse can be used in cyber-warfare and cyber-terrorism, as recent attacks in the field of industrial espionage have shown. To coordinate methods of defence a categorisation of the threat posed by Trojan horses in the shape of a list of tuples is proposed.
Stefan Kiltz   +2 more
openaire   +2 more sources

Malware

2006
In the two decades since its first significant appearance, malware has become the most prominent and costly threat to modern IT systems. This chapter examines the nature of malware evolution. It highlights that, as well as the more obvious development of propagation techniques, the nature of payload activities (and the related motivations of the ...
Steven Furnell, Jeremy Ward
openaire   +1 more source

Malware behavior image for malware variant identification

2014 International Symposium on Biometrics and Security Technologies (ISBAST), 2014
Several methods have been devised by researchers to facilitate malware analysis and one of them is through malware visualization. Malware visualization is a field that focuses on representing malware features in a form of visual cues that could be used to convey more information about a particular malware.
Syed Zainudeen Mohd Shaid   +1 more
openaire   +1 more source

Optimising Malware

2006 IEEE International Performance Computing and Communications Conference, 2006
J.M. Fernandez, P. Bureau
openaire   +2 more sources

Home - About - Disclaimer - Privacy