-
21
Availability evaluation method for extended epidemic model and Markov chain based IoT
Published 2021-04-01Subjects: Get full text
Article -
22
Earthworm optimization algorithm based cascade LSTM-GRU model for android malware detection
Published 2025-12-01Subjects: “…Malware detection…”
Get full text
Article -
23
DLCDroid an android apps analysis framework to analyse the dynamically loaded code
Published 2025-01-01Subjects: Get full text
Article -
24
Scheme for identifying malware traffic with TLS data based on machine learning
Published 2020-02-01Subjects: Get full text
Article -
25
Malware prediction technique based on program gene
Published 2018-08-01Subjects: Get full text
Article -
26
Research on Operators Mobile Malware Protection Architecture and Key Technologies
Published 2014-01-01Subjects: Get full text
Article -
27
Adversarial method for malicious ELF file detection based on deep reinforcement learning
Published 2024-10-01Subjects: Get full text
Article -
28
Homology analysis of malware based on graph
Published 2017-11-01Subjects: “…malware…”
Get full text
Article -
29
Advanced Malware Detection: Integrating Convolutional Neural Networks with LSTM RNNs for Enhanced Security
Published 2024-12-01Subjects: Get full text
Article -
30
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers
Published 2024-06-01Subjects: “…malware…”
Get full text
Article -
31
Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
Published 2025-01-01Subjects: “…Malware Android…”
Get full text
Article -
32
Fast reused code tracing method based on simhash and inverted index
Published 2016-11-01Subjects: Get full text
Article -
33
Malware classification method based on static multiple-feature fusion
Published 2017-11-01Subjects: “…malware…”
Get full text
Article -
34
Review of malware detection and classification visualization techniques
Published 2023-10-01Subjects: Get full text
Article -
35
Research on a Mobile Malicious Code Management and Control Method Based on Cloud-Pipeline-Terminal
Published 2013-08-01Subjects: Get full text
Article -
36
Attack signature generation by traceable dynamic taint analysis
Published 2012-05-01Subjects: “…malware…”
Get full text
Article -
37
Research status and outlook of Android security
Published 2016-10-01Subjects: Get full text
Article -
38
Integrating Information Gain and Chi-Square for Enhanced Malware Detection Performance
Published 2025-01-01Subjects: “…Malware detection…”
Get full text
Article -
39
Mechanism and implementation of Rootkit attack and defense
Published 2018-12-01Subjects: Get full text
Article -
40
MalAware: A tabletop exercise for malware security awareness education and incident response training
Published 2024-01-01Subjects: “…Malware…”
Get full text
Article