Results 161 to 170 of about 81,305 (190)
Some of the next articles are maybe not open access.

Malware Dynamic Analysis Evasion Techniques

ACM Computing Surveys, 2020
Amir Afianian
exaly  

File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements

ACM Computing Surveys, 2023
Trivikram Muralidharan   +2 more
exaly  

Smartphone Malware and Its Propagation Modeling: A Survey

IEEE Communications Surveys and Tutorials, 2014
Sancheng Peng, Shui Yu
exaly  

Android Security: A Survey of Issues, Malware Penetration, and Defenses

IEEE Communications Surveys and Tutorials, 2015
Vijay Laxmi, Parvez Farui, Mauro Conti
exaly  

A Survey on Malware Detection Using Data Mining Techniques

ACM Computing Surveys, 2018
Yanfang Ye, Tao Li
exaly  

Malware and Anti-Malware: A Comprehensive Review

With the explosive growth of digital connectivity and the professionalization of cybercrime, malware attacks have become one of the most persistent and sophisticated cybersecurity threats. This landscape now ranges from traditional viruses and worms to complex ransomware-as-a-service (RaaS) syndicates and advanced persistent threats (APTs).
openaire   +1 more source

A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions

IEEE Communications Surveys and Tutorials, 2017
Ethan M Rudd   +2 more
exaly  

Home - About - Disclaimer - Privacy