Showing 21 - 40 results of 139 for search 'Malwa*', query time: 0.06s Refine Results
  1. 21
  2. 22

    Cybersecurity Infrastructure Compliance Key Factors to Detect and Mitigate Malware Attacks in SMEs: A Systematic Literature Review by Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, Abdulkarim Kanaan Jebna, Kiran Adnan

    Published 2025-01-01
    “…Malwares are growing exponentially and are becoming challenging with time, especially for Small and Medium Enterprises (SMEs). …”
    Get full text
    Article
  3. 23

    Power Consumption Based Android Malware Detection by Hongyu Yang, Ruiwen Tang

    Published 2016-01-01
    “…In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. …”
    Get full text
    Article
  4. 24
  5. 25
  6. 26
  7. 27
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34

    A Data Mining Classification Approach for Behavioral Malware Detection by Monire Norouzi, Alireza Souri, Majid Samad Zamini

    Published 2016-01-01
    “…Also our proposed data mining approach is more efficient for detecting malware and behavioral classification of malware can be useful to detect malware in a behavioral antivirus.…”
    Get full text
    Article
  15. 35
  16. 36

    MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling by Wei Gu, Hongyan Xing, Tianhao Hou

    Published 2024-01-01
    “…These promising experimental results show that MFEMDroid is an effective approach to detect Android malware.…”
    Get full text
    Article
  17. 37
  18. 38
  19. 39

    Combined dynamic multi-feature and rule-based behavior for accurate malware detection by Mohamed Belaoued, Abdelaziz Boukellal, Mohamed Amir Koalal, Abdelouahid Derhab, Smaine Mazouzi, Farrukh Aslam Khan

    Published 2019-11-01
    “…Malware have become the scourge of the century, as they are continuously evolving and becoming more complex with increasing damages. …”
    Get full text
    Article
  20. 40