Results 191 to 200 of about 97,198 (223)
A novel technique for ransomware detection using image based dynamic features and transfer learning to address dataset limitations. [PDF]
Ferdous J +3 more
europepmc +1 more source
Mathematical analysis of the dynamics of cyberattack propagation in IoT networks. [PDF]
AbuHour Y +4 more
europepmc +1 more source
BERT ensemble based MBR framework for android malware detection. [PDF]
Alsubaei FS +5 more
europepmc +1 more source
Detecting malicious code variants using convolutional neural network (CNN) with transfer learning. [PDF]
Younas N +5 more
europepmc +1 more source
Designing A Pdf Malware Detection System Using Machine Learning
Salman Abdul Jabbaar Wiharja +2 more
openalex +2 more sources
A Cybersecurity NER Method Based on Hard and Easy Labeled Training Data Discrimination. [PDF]
Ye L, Wu Y, Zhang H, Ge M.
europepmc +1 more source
A Threat to Cyber Resilience : A Malware Rebirthing Botnet
Murray Brand +2 more
openalex +1 more source
GEAAD: generating evasive adversarial attacks against android malware defense. [PDF]
Ahmad N +6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2007
The Trojan horse can be used in cyber-warfare and cyber-terrorism, as recent attacks in the field of industrial espionage have shown. To coordinate methods of defence a categorisation of the threat posed by Trojan horses in the shape of a list of tuples is proposed.
Stefan Kiltz +2 more
openaire +2 more sources
The Trojan horse can be used in cyber-warfare and cyber-terrorism, as recent attacks in the field of industrial espionage have shown. To coordinate methods of defence a categorisation of the threat posed by Trojan horses in the shape of a list of tuples is proposed.
Stefan Kiltz +2 more
openaire +2 more sources

