Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference55 articles.
1. Bhuiyan, M.Z.A., Wang, T., Hayajneh, T., Weiss, G.M.: Maintaining the balance between privacy and data integrity in Internet of Things. In: ACM International Conference Proceeding Series, pp. 177–182. (2017). https://doi.org/10.1145/3034950.3035011
2. Bahtiyar, Ş, Yaman, M.B., Altıniğne, C.Y.: A multi-dimensional machine learning approach to predict advanced malware. Comput. Netw. 160, 118–129 (2019). https://doi.org/10.1016/j.comnet.2019.06.015
3. Pasha, M., Prathima, M., Thirupati, L.: Malwise system for packed and polymorphic malware. Citeseer 3(1), 167–172 (2014)
4. Orbis, M.K.: Cyber-Terrorism in a Post-Stuxnet World. Elsevier. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0030438714000787. Accessed from 02 Dec 2021
5. Symantec: 015 Internet Security Threat Report, p. 119. (2015)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK: Visualization-based Malware Detection Techniques;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. A Kullback-Liebler divergence-based representation algorithm for malware detection;PeerJ Computer Science;2023-09-22