-
81
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
Published 2014-11-01Subjects: “…Trojan malware…”
Get full text
Article -
82
Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection
Published 2014-01-01“…The model predicts the number of infected smartphones depending on the type of malware. Additionally, we will estimate the cost that the users should afford when the malware is in their devices. …”
Get full text
Article -
83
Single password authentication method for remote user based on mobile terminal assistance
Published 2019-02-01Subjects: Get full text
Article -
84
Adversarial method for malicious ELF file detection based on deep reinforcement learning
Published 2024-10-01Subjects: Get full text
Article -
85
-
86
Research on malicious code variants detection based on texture fingerprint
Published 2014-08-01Subjects: Get full text
Article -
87
Fuzzy reasoning model for analysis of program maliciousness
Published 2010-01-01Subjects: “…malware detection…”
Get full text
Article -
88
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers
Published 2024-06-01Subjects: “…malware…”
Get full text
Article -
89
Using coverage analysis to extract Botnet command-and-control protocol
Published 2014-01-01Subjects: “…malware analysis…”
Get full text
Article -
90
Fast reused code tracing method based on simhash and inverted index
Published 2016-11-01Subjects: Get full text
Article -
91
Research on Android security of broadcasting mechanism
Published 2016-10-01Subjects: Get full text
Article -
92
Research on a Mobile Malicious Code Management and Control Method Based on Cloud-Pipeline-Terminal
Published 2013-08-01Subjects: Get full text
Article -
93
DLCDroid an android apps analysis framework to analyse the dynamically loaded code
Published 2025-01-01Subjects: Get full text
Article -
94
Attack signature generation by traceable dynamic taint analysis
Published 2012-05-01Subjects: “…malware…”
Get full text
Article -
95
Research status and outlook of Android security
Published 2016-10-01Subjects: Get full text
Article -
96
Successive memory image analysis method for malicious codes
Published 2017-02-01Subjects: “…malware…”
Get full text
Article -
97
Automatic generating regular expression signatures for real network worms
Published 2013-03-01Subjects: Get full text
Article -
98
Mechanism and implementation of Rootkit attack and defense
Published 2018-12-01Subjects: Get full text
Article -
99
Availability evaluation method for extended epidemic model and Markov chain based IoT
Published 2021-04-01Subjects: Get full text
Article -
100