Author:
Yaffe Dorel,Hendler Danny
Publisher
Springer International Publishing
Reference20 articles.
1. Meeting the challenges of endpoint security. https://www.cstl.com/utils/downloads/Symantec-Hosted-Endpoint-Whitepaper.pdf. Accessed Oct 2020
2. Understanding MDR, EDR, EPP and XDR. https://www.netsurion.com/articles/understanding-mdr-edr-epp-and-xdr. Accessed Oct 20202
3. Aslan, Ö.A., Samet, R.: A comprehensive review on malware detection approaches. IEEE Access 8, 6249–6271 (2020)
4. Chakkaravarthy, S.S., Sangeetha, D., Vaidehi, V.: A survey on malware analysis and mitigation techniques. Comput. Sci. Rev. 32, 1–23 (2019)
5. Erdődi, L., Jøsang, A.: Exploitation vs. prevention: the ongoing saga of software vulnerabilities. Acta Polytechnica Hungarica 17(7) (2020)