-
1Published 2007Table of Contents: “…Overview -- Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 -- Software…”
Full Text via HEAL-Link
Electronic eBook -
2Table of Contents: “…Introduction -- A Survey of Android Malware -- Case Studies -- Discussion -- Additional Reading…”
Full Text via HEAL-Link
Electronic eBook -
3
-
4
-
5
-
6
-
7
-
8Table of Contents: “…1. What is Malware? -- 2. Prevention and Defense -- 3. Malware Defense in Depth -- 4. Identifying…”
Full Text via HEAL-Link
Electronic eBook -
9Published 2018Subjects: “…Malware and its mitigation…”
Full Text via HEAL-Link
Electronic Conference Proceeding eBook -
10
-
11
-
12
-
13Published 2016Table of Contents: “…Intrusion detection -- Malware analysis -- Vulnerability assessment -- Novel ideas, techniques…”
Full Text via HEAL-Link
Electronic eBook -
14Published 2019Table of Contents: “… of Traffic Signal Infrastructure -- Malware -- Practical Enclave Malware with Intel SGX -- How does Malware…”
Full Text via HEAL-Link
Electronic eBook -
15Published 2018Table of Contents: “…Malware analysis -- Mobile and embedded security -- Attacks -- Detection and containment -- Web…”
Full Text via HEAL-Link
Electronic eBook -
16Published 2008Table of Contents: “… -- Malware Detection and Prevention (I) -- Dynamic Binary Instrumentation-Based Framework for Malware Defense…”
Full Text via HEAL-Link
Electronic eBook -
17Published 2006Table of Contents: “… -- Using Contextual Security Policies for Threat Response -- Malware and Forensics -- Detecting Self…”
Full Text via HEAL-Link
Electronic eBook -
18Published 2013Table of Contents: “…Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware…”
Full Text via HEAL-Link
Electronic eBook -
19
-
20Published 2017Table of Contents: “…Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection…”
Full Text via HEAL-Link
Electronic eBook