Author:
Saraswathi Pedada,Krishna V. Vamsi,Yashwanth D. Venkata,Aidhitha K.,Bindu M.
Publisher
Springer Nature Singapore
Reference27 articles.
1. Anderson R et al (2013) ‘Measuring the cost of cybercrime. The economics of information security and privacy. Springer, Berlin, pp 265–300
2. Li B, Roundy K, Gates C, Vorobeychik Y (2017) Large-scale identification of malicious singleton files. In: Proceedings on 7th ACM Conf. Data Appl. Secur. Privacy. ACM, New York, pp 227–238
3. Alazab M, Venkataraman S, Watters P (2010) Towards understanding malware behaviour by the extraction of API calls. In: Proceedings on Second cybercrime and trustworthy computing workshop, pp 52–59
4. Rao PM, Deebak BD (2022) Security and privacy issues in smart cities/industries: Technologies, applications, and challenges. J Ambient Intell Human Comput 2022:1–37
5. Alazab M, Venkatraman S, Watters P, Alazab M (2011) Zero-day malware detection based on supervised learning algorithms of API call signatures. In: Proceedings 9th Australasian Data Mining Conference, vol 121. Australian Computer Society, Ballarat, Australia, pp 171–182