Showing 1 - 20 results of 388 for search '"malware"', query time: 0.15s Refine Results
  1. 1
    Published 2007
    Table of Contents: “…Overview -- Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 -- Software…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 2
    by Jiang, Xuxian, Zhou, Yajin
    Published 2013
    Table of Contents: “…Introduction -- A Survey of Android Malware -- Case Studies -- Discussion -- Additional Reading…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 3
    by Christodorescu, Mihai
    Published 2007
    Get full text
    Electronic Kit Book
  4. 4
  5. 5
    by Aycock, John
    Published 2006
    Full Text via HEAL-Link
    Electronic eBook
  6. 6
    by Yin, Heng, Song, Dawn
    Published 2013
    Full Text via HEAL-Link
    Electronic eBook
  7. 7
    by Aycock, John
    Published 2006
    Get full text
    Electronic Kit Book
  8. 8
    by Bettany, Andrew, Halsey, Mike
    Published 2017
    Table of Contents: “…1. What is Malware? -- 2. Prevention and Defense -- 3. Malware Defense in Depth -- 4. Identifying…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 9
    Published 2018
    Subjects: “…Malware and its mitigation…”
    Full Text via HEAL-Link
    Electronic Conference Proceeding eBook
  10. 10
  11. 11
  12. 12
  13. 13
    Published 2016
    Table of Contents: “…Intrusion detection -- Malware analysis -- Vulnerability assessment -- Novel ideas, techniques…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 14
    Published 2019
    Table of Contents: “… of Traffic Signal Infrastructure -- Malware -- Practical Enclave Malware with Intel SGX -- How does Malware…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 15
    Published 2018
    Table of Contents: “…Malware analysis -- Mobile and embedded security -- Attacks -- Detection and containment -- Web…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 16
    Published 2008
    Table of Contents: “… -- Malware Detection and Prevention (I) -- Dynamic Binary Instrumentation-Based Framework for Malware Defense…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 17
    Published 2006
    Table of Contents: “… -- Using Contextual Security Policies for Threat Response -- Malware and Forensics -- Detecting Self…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 18
    Published 2013
    Table of Contents: “…Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 19
  20. 20
    Published 2017
    Table of Contents: “…Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search