Results 191 to 200 of about 97,198 (223)

Mathematical analysis of the dynamics of cyberattack propagation in IoT networks. [PDF]

open access: yesPLoS One
AbuHour Y   +4 more
europepmc   +1 more source

BERT ensemble based MBR framework for android malware detection. [PDF]

open access: yesSci Rep
Alsubaei FS   +5 more
europepmc   +1 more source

Designing A Pdf Malware Detection System Using Machine Learning

open access: diamond
Salman Abdul Jabbaar Wiharja   +2 more
openalex   +2 more sources

GEAAD: generating evasive adversarial attacks against android malware defense. [PDF]

open access: yesSci Rep
Ahmad N   +6 more
europepmc   +1 more source

Malware

2007
The Trojan horse can be used in cyber-warfare and cyber-terrorism, as recent attacks in the field of industrial espionage have shown. To coordinate methods of defence a categorisation of the threat posed by Trojan horses in the shape of a list of tuples is proposed.
Stefan Kiltz   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy