Results 241 to 250 of about 134,256 (265)
Some of the next articles are maybe not open access.

Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN

International Conference on Data Mining and Big Data, 2017
Machine learning has been used to detect new malware in recent years, while malware authors have strong motivation to attack such algorithms. Malware authors usually have no access to the detailed structures and parameters of the machine learning models ...
Weiwei Hu, Ying Tan
semanticscholar   +1 more source

Optimising Malware

2006 IEEE International Performance Computing and Communications Conference, 2006
J.M. Fernandez, P. Bureau
openaire   +2 more sources

Types of Malware and Malware Distribution Strategies

2015
The goal of this chapter is to provide a brief overview of different types of malware that have been used to carry out cyber-attacks. In most cases, we will provide examples of each category of malware. Moreover, malware tends to be distributed in different ways and propagate in different ways.
V. S. Subrahmanian   +3 more
openaire   +1 more source

Malware

2019
Ramjee Prasad, Vandana Rohokale
  +4 more sources

Malware intelligence: beyond malware analysis

International Journal of Advanced Intelligence Paradigms, 2019
Ekta Gandotra   +2 more
openaire   +1 more source

Malware

2008
Rad opisuje tipove malicioznih računalnih programa.
openaire   +1 more source

Malware traffic classification using convolutional neural network for representation learning

International Conference on Information Networking, 2017
Wei Wang   +4 more
semanticscholar   +1 more source

Malware

2022
Bharat S. Rawal   +2 more
openaire   +1 more source

Malware

Library & Archival Security, 2004
openaire   +2 more sources

Home - About - Disclaimer - Privacy