Author:
Huda Shamsul,Abawajy Jemal,Alazab Mamoun,Abdollalihian Mali,Islam Rafiqul,Yearwood John
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference44 articles.
1. Cybercrimes: A Multidisciplinary Analysis;Ghosh,2010
2. I. You, K. Kim, Malware obfuscation techniques: a brief survey, in: International Conference on Broadband, Wireless Computing, Communication and Applications, 2010, pp. 297–300.
3. Malware detection module using machine learning algorithms to assist in centralized security in enterprise networks;Singhal;International Journal of Network Security & Its Applications (IJNSA),2012
4. A. Stabek, P. Watters, R. Layton, The seven scam types: Mapping the terrain of cybercrime, in: Cybercrime and Trustworthy Computing Workshop, Ballarat, Victorial, Australia, 2010, pp. 41–51.
5. A heuristic approach for detection of obfuscated malware;Treadwell,2009
Cited by
94 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献