Results 161 to 170 of about 81,305 (190)
Some of the next articles are maybe not open access.
Dynamic Malware Analysis in the Modern Era—A State of the Art Survey
ACM Computing Surveys, 2020Nir Nissim
exaly
Smartphone Malware and Its Propagation Modeling: A Survey
IEEE Communications Surveys and Tutorials, 2014Sancheng Peng, Shui Yu
exaly
Android Security: A Survey of Issues, Malware Penetration, and Defenses
IEEE Communications Surveys and Tutorials, 2015Vijay Laxmi, Parvez Farui, Mauro Conti
exaly
A Survey on Malware Detection Using Data Mining Techniques
ACM Computing Surveys, 2018Yanfang Ye, Tao Li
exaly
Malware and Anti-Malware: A Comprehensive Review
With the explosive growth of digital connectivity and the professionalization of cybercrime, malware attacks have become one of the most persistent and sophisticated cybersecurity threats. This landscape now ranges from traditional viruses and worms to complex ransomware-as-a-service (RaaS) syndicates and advanced persistent threats (APTs).openaire +1 more source

