Search Result "malicious code"
Malicious Route Detection in Vehicular Ad-hoc Network using Geographic Routing with Masked Data
Journal: Recent Advances in Computer Science and Communications
Volume: 13 Issue: 3 Year: 2020 Page: 319-325
Author(s): Saravanan Palani,Logesh Ravi,Vijayakumar Varadarajan,Subramaniyaswamy Vairavasundaram,Xiao-Zhi Gao
Clustering Morphed Malware using Opcode Sequence Pattern Matching
Journal: Recent Patents on Engineering
Volume: 12 Issue: 1 Year: 2018 Page: 30-36
Author(s): Ekta Gandotra,Sanjam Singla,Divya Bansal,Sanjeev Sofat
A Survey on VANETs Security Attacks and Sybil Attack Detection
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 6 Issue: 1 Year: 2016 Page: 45-62
Author(s): Chaitanya Kumar Karn, Chandra Prakash Gupta
Information Security and Threats in Mobile Appliances
Journal: Recent Patents on Computer Science
Volume: 7 Issue: 1 Year: 2014 Page: 3-11
Author(s): Antonio Tedeschi,Angelo Liguori,Francesco Benedetto
Effect of Quarantine and Recovery on Infectious Nodes in Wireless Sensor Network
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 8 Issue: 1 Year: 2018 Page: 26-36
Author(s): Pramod K. Srivastava,Rudra P. Ojha,Kavita Sharma,Shashank Awasthi,Goutam Sanyal
Ransomware: Rising Threat of New-Age Digital Extortion
Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010003
Feature Selection and Classification Models of Intrusion Detection Systems -A Review on Industrial Critical Infrastructure Perspective
Ebook: Cyber Physical Systems - Advances and Applications
Volume: 1 Year: 2024
Author(s):
Doi: 10.2174/9789815223286124010010
A Wrapper Based Feature Selection Using Grey Wolf Optimization for Botnet Attack Detection
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 11 Issue: 9 Year: 2021 Page: 951-956
Author(s): Ravi Kiran Verma Penmatsa,S Kumar Reddy Mallidi,Rohit Rishi Muni
Detecting Ballot Stuff Collusion Attack in Reputation System for Mobile Agents Security
Ebook: Augmented Intelligence: Deep Learning, Machine Learning, Cognitive Computing, Educational Data Mining
Volume: 3 Year: 2022
Author(s):
Doi: 10.2174/9789815040401122030008
File Content-based Malware Classification
Ebook: Artificial Intelligence, Machine Learning and User Interface Design
Volume: 1 Year: 2024
Author(s): Chhaya S. Gosavi
Doi: 10.2174/9789815179606124010014