Mostrando 181 - 200 Resultados de 290 Para Buscar '"malware"', tiempo de consulta: 0.08s Limitar resultados
  1. 181
  2. 182
    por Born, Michael
    Publicado 2019
    “…The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering.…”
    Enlace del recurso
  3. 183
    Publicado 2020
    “…Meanwhile, new forms of ransomware have emerged, including malware originating from North Korea.…”
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  4. 184
    “…Firstly, we identify the URLs as either benign or malware using a binary classifier. Secondly, we classify the URL classes based on their feature into five classes: benign, spam, phishing, malware, and defacement. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  5. 185
    por Bambenek, John
    Publicado 2009
    “…This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it -- for everything from mail filtering and system log management to malware analysis. The book includes useful information not contained in the current grep documentation…”
    Enlace del recurso
  6. 186
    “…Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  7. 187
    “…Cyber security concerns have many forms, but this study focuses on social engineering, denial of services, malware, and attacks on personal data. Firms worldwide spend a lot on addressing cybersecurity issues, which grow each year. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  8. 188
    “…Cryptojacking or illegal mining is a form of malware that hides in the victim’s computer and takes the computational resources to extract cryptocurrencies in favor of the attacker. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  9. 189
    “…According to Forbes, Internet hits surged by 50-70%.(1) This phase shift caught the eye of adversaries, causing increased numbers of targeted and broad-based attacks such as phishing, malware distribution and online fear-mongering in order to conduct scams and fraudulent operations. …”
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  10. 190
    “…Ransomware is a more hazardous threat than other malware as the victim of ransomware cannot regain access to the hijacked device until some form of compensation is paid. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  11. 191
    por Jakobsson, Markus
    Publicado 2012
    “…Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. …”
    Enlace del recurso
  12. 192
    “…Some VPNs will steal our bandwidth, infect our computers with malware, install secret tracking libraries on our devices, steal our personal data, and leave our data exposed to third parties. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  13. 193
    “…Our study shows that this flaw can be exploited by a method to (i) disable the anti-malware suite Symantec Endpoint Protection; (ii) overtake VirtualBox protected processes; (iii) circumvent two major video game anti-cheat protection solutions, BattlEye and EasyAntiCheat. …”
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 194
    por Buschendorf, Fabiola
    Publicado 2018
    “…In this way, security researchers and network admins gain information about the source of attacks, the techniques used by intruders and possibly gain access to unknown malware samples uploaded by the adversaries.…”
    Enlace del recurso
  15. 195
    por Zonouz, Saman
    Publicado 2017
    “…His previous works and research interests include PLC program analysis, security of embedded systems, and malware analysis and reverse engineering.</p> <p>Before the collaboration meeting, Dr. …”
    Enlace del recurso
  16. 196
    “…This study highlights the need for further research in bitcoin, blockchain, IoT, NLP, cryptocurrencies, phishing and cybercrime, botnets and malware, digital forensics, and electronic crime countermeasures about the Darkweb. …”
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  17. 197
    “…The assumed evaluation methodology contemplates six phases that allow building a detection model against botnet-related malware distributed through the network, for which five supervised classifiers were instantiated were instantiated for further comparisons—Decision Tree, Random Forest, Naive Bayes Gaussian, Support Vector Machine and K-Neighbors. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 198
    “…In addition, the proposed algorithm is also successfully applied to the practical tasks of malware prediction in the field of malware analysis. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  19. 199
    por Sanders, Chris, 1986-
    Publicado 2014
    Tabla de Contenidos: “…Machine generated contents note: Introduction to NSM Driving Data Collection The Sensor Platform Full Packet Capture Data Session Data Protocol Metadata Statistical Data Indicators of Compromise Target-Based Detection Signature-Based Detection with Snort Signature-Based Detection with Suricata Anomaly-Based Detection with Bro Early Warning AS&W with Honeypots Packet Analysis Friendly Intelligence Hostile Intelligence Differential Diagnosis of NSM Events Incident Morbidity and Mortality Malware Analysis for NSM .…”
    Libro
  20. 200
    por CERN. Geneva
    Publicado 2006
    “…<br> <br>Beyond technical fixes to malware attacks, I will argue that there is an urgent need for organisations and nations to construct Total Information Awareness Systems and Knowledge Management Analysis Systems, to combat the rising tide of cybercrime and cyberterrorism. …”
    Enlace del recurso
Herramientas de búsqueda: RSS