Results 191 to 200 of about 6,970 (211)
Some of the next articles are maybe not open access.
2018
This chapter serves as an introduction into malware analysis. This chapter discusses the different types of malware and describes how malware infects computers. Also, it introduces you to practical approaches of analyzing malware through three case examples so as to provide insight into different ways how malware works.
openaire +1 more source
This chapter serves as an introduction into malware analysis. This chapter discusses the different types of malware and describes how malware infects computers. Also, it introduces you to practical approaches of analyzing malware through three case examples so as to provide insight into different ways how malware works.
openaire +1 more source
Malware Analysis Using Volatility
Digital Forensics (4n6) Journal, 2020Volatile Data of a computer is a temporary and they are created when a computer system is running aka in operational condition. They are removed immediately when the system powered off. It is stored on the Random Access Memory (RAM) and other temporary storage units such as Registars of the Computer and not in the main storage partitions of Hard Drives.
openaire +1 more source
Malware intelligence: beyond malware analysis
International Journal of Advanced Intelligence Paradigms, 2019Ekta Gandotra +2 more
openaire +1 more source
Challenge of Malware Analysis: Malware obfuscation Techniques
It is a big concern to provide the security to computer system against malware. Every day millions of malware are being created and the worse thing is that new malware is highly sophisticated which are very difficult to detect. Because the malware developers use the various obfuscation techniques to hide the actual code or the behaviour of malware ...SİNGH, Jagsir, SİNGH, Jaswinder
openaire +1 more source
Polymorphic Malware Analysis Model
Proceedings of Computer Science and Information Technologies 2023 Conference, 2023Robert Hakobyan, Timur Jamgharyan
openaire +1 more source
Malware Analysis and Detection
Proceedings of the Second International Conference on AI-ML Systems, 2022Hemant Rathore, Mohit Sewak
openaire +1 more source

