Search Result "malware propagation"


Research Article

A Study of Malware Propagation Dynamics in Wireless Sensor Network Using Spatially Correlated Security Model

Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 5 Year: 2021 Page: 1440-1447
Author(s): Satya R. Biswal,Santosh K. Swain

File Content-based Malware Classification

Ebook: Artificial Intelligence, Machine Learning and User Interface Design
Volume: 1 Year: 2024
Author(s): Chhaya S. Gosavi
Doi: 10.2174/9789815179606124010014

Hybrid Swarm Intelligence and Artificial Neural Network for Mitigating Malware Effects

Journal: Recent Patents on Computer Science
Volume: 7 Issue: 1 Year: 2014 Page: 38-53
Author(s): Tarek S. Sobh

Ransomware: Rising Threat of New-Age Digital Extortion

Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010003

A Framework to Detect Repackaged Android Applications in Smartphone Devices

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 5 Issue: 1 Year: 2015 Page: 47-57
Author(s): Sajal Rastogi,Kriti Bhushan,Brij B. Gupta

Research Article

Effect of Quarantine and Recovery on Infectious Nodes in Wireless Sensor Network

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 8 Issue: 1 Year: 2018 Page: 26-36
Author(s): Pramod K. Srivastava,Rudra P. Ojha,Kavita Sharma,Shashank Awasthi,Goutam Sanyal

Editorial free to download

Big Data Analysis for Multi-Criteria Decision Making

Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 5 Year: 2021 Page: 1400-1401
Author(s): Akshi Kumar,M.P.S. Bhatia

Security: Does Mobile Application Protect Against Unwanted Usage?

Ebook: Handbook of Mobile Application Development: A Guide to Selecting the Right Engineering and Quality Features
Volume: 1 Year: 2021
Author(s): Naveen Safia,Hafedh Al-Shihi,Mohamed Sarrab
Doi: 10.2174/9789814998246121010008

Research Article

A Method for Estimating the Uncertainties in Attacker’s Behavior Using Attack Graph Structure

Journal: Recent Advances in Communications and Networking Technology (Discontinued)
Volume: 6 Issue: 1 Year: 2017 Page: 26-40
Author(s): Letafat Sadat Mohajirani,Hamed Orojloo

Enhancing Cyber Security: A Comparative Study of Artificial Neural Networks (ANN) and Machine Learning for Improved Network Vulnerability Detection

Ebook: Advanced Technologies for Realizing Sustainable Development Goals: 5G, AI, Big Data, Blockchain, and Industry 4.0 Application
Volume: 1 Year: 2024
Author(s):
Doi: 10.2174/9789815256680124010011

Previous   Next

Go To   Results 1 - 1 of 22

Apply Filters

Volume Years
Article Type
    Publication Title
    Subject Title

Content Type


Ads
© 2024 Bentham Science Publishers | Privacy Policy