Search Result "malware behavior"


Research Article

Towards a New Cyberdefense Generation: Proposition of an IntelligentCybersecurity Framework for Malware Attacks

Journal: Recent Advances in Computer Science and Communications
Volume: 15 Issue: 8 Year: 2022 Page: 1026-1042
Author(s): Ikram Ben Abdel Ouahab,Mohammed Bouhorma,Lotfi El Aachak,Anouar Abdelhakim Boudhir

A Swift Approach for Malware Detection

Ebook: Advanced Computing Techniques: Implementation, Informatics and Emerging Technologies
Volume: 1 Year: 2021
Author(s): Chetna Choudhary,Abhishek Srivastava,Deepti Mehrotra,S. Hasnain Pasha
Doi: 10.2174/9789814998451121010008

Research Article

A Study of Malware Propagation Dynamics in Wireless Sensor Network Using Spatially Correlated Security Model

Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 5 Year: 2021 Page: 1440-1447
Author(s): Satya R. Biswal,Santosh K. Swain

Hybrid Swarm Intelligence and Artificial Neural Network for Mitigating Malware Effects

Journal: Recent Patents on Computer Science
Volume: 7 Issue: 1 Year: 2014 Page: 38-53
Author(s): Tarek S. Sobh

Research Article

A Method for Estimating the Uncertainties in Attacker’s Behavior Using Attack Graph Structure

Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 6 Issue: 1 Year: 2017 Page: 26-40
Author(s): Letafat Sadat Mohajirani,Hamed Orojloo

The Linguistic Frontier: Unleashing the Power of Natural Language Processing in Cybersecurity

Ebook: A Handbook of Computational Linguistics: Artificial Intelligence in Natural Language Processing
Volume: 2 Year: 2024
Author(s):
Doi: 10.2174/9789815238488124020019

Comparing Single-Tier And Three-Tier Infrastructure Designs Against DDoS Attacks

Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010011

Enhancement of Iot Security Solutions Using Blockchain Technology

Ebook: Advances in Computing Communications and Informatics
Volume: 1 Year: 2021
Author(s): K. Sheela,C. Priya
Doi: 10.2174/9781681088624121010009

Securing the Infinite: Traversing Cybersecurity Challenges in the Metaverse

Ebook: Beyond the Realms: Navigating the Metaverse
Volume: 1 Year: 2024
Author(s):
Doi: 10.2174/9789815238457124010008

Overview of Attack Surfaces in Blockchain

Ebook: Blockchain Applications in Cybersecurity Solutions
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815080599123010007

Previous   Next

Go To   Results 1 - 1 of 36

Apply Filters

Volume Years
Article Type
    Publication Title
    Subject Title

Content Type


Ads
© 2024 Bentham Science Publishers | Privacy Policy