Author:
Doukas Nikolaos,Stavroulakis Peter,Bardis Nikolaos
Publisher
Springer International Publishing
Reference18 articles.
1. Alazab, M., R. Layton, R. Broadhurst, and B. Bouhours. 2013. Malicious spam emails developments and authorship attribution. Fourth cybercrime and trustworthy computing workshop 58–68.
2. Alazab, M., S. Venkatraman, P. Watters, and M. Alazab. 2013. Information security governance: The art of detecting hidden malware. IT security governance innovations: theory and research, 293–315. Harrisburg: IGI Global.
3. Asăvoae, Irina Măriuca, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, and Siraj Ahmed Shaikh. 2017. Detecting malicious collusion between mobile software applications: The AndroidTM case. https://www.jorgeblascoalis.com/assets/papers/Asavoae2017.pdf.
4. Atighetchi, Michael, and Joseph Loyall. 2010. Meaningful and flexible survivability assessments: Approach and practice, 12–18. In CrossTalk: The journal of defense software engineering.
5. Azab, A., M. Alazab, and M. Aiash. 2016. Machine learning based botnet identification traffic. IEEE Trustcom/BigDataSE/ISPA 1788–1794.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Application Security using SQL Malware Detection and Prevention Scheme;2022 IEEE International Conference on Current Development in Engineering and Technology (CCET);2022-12-23
2. Equipment Monitoring System with use of Digital Twins and Internet of Things: Algorithms, Architecting and Experiments;2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS);2021-09-22
3. Survivability Using Artificial Intelligence Assisted Cyber Risk Warning;Advances in Information Security;2012-02-24