Truva Atı Zararlı Yazılımlarına Yaklaşım ve Çözüm Önerileri
Reference18 articles.
1. Adachi, D., and Omote, K. (2016). A host-based detection method of remote access trojan in the early stage. In International Conference on Information Security Practice and Experience (pp. 110-121). Springer, Cham. 2. Barabosch, T., Bergmann, N., Dombeck, A., and Padilla, E. (2017). Quincy: Detecting host-based code injection attacks in memory dumps. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 209-229). Springer, Cham. 3. Chen, Z., Wei, P., & Delis, A. (2008). Catching remote administration trojans (RATs). Software: Practice and Experience, 38(7), 667-703. 4. Emm, D., Garnaeva, M., Ivanov, A., Makrushin, D., & Unuchek, R. (2015). IT threat evolution in Q2 2015. Moscow, 125212, Russian Federation: Kaspersky Lab HQ. 5. Jain, N., Stiller, B., Khan, I., Makarov, V., Marquardt, C., & Leuchs, G. (2014). Risk analysis of Trojan-horse attacks on practical quantum key distribution systems. IEEE Journal of Selected Topics in Quantum Electronics, 21(3), 168-177.
|
|