Search
for Topics
All Reviews
Browse All Reviews
>
Computing Milieux (K)
>
Management Of Computing And Information Systems (K.6)
>
Security and Protection (K.6.5)
> Invasive Software (K.6.5...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 32 Reviews about "
Invasive Software (K.6.5...)
":
Date Reviewed
A novel malware analysis for malware detection and classification using machine learning algorithms
Sethi K., Chaudhary S., Tripathy B., Bera P. SIN 2017 (Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, India, Oct 13-15, 2017) 107-113, 2017. Type: Proceedings
The authors describe a system that identifies malware. The system works both at the macro level, which distinguishes malware from clean software, and at the micro level, which distinguishes between types of malware, for example, Trojan...
Nov 8 2018
Titans’ revenge: detecting Zeus via its own flaws
Riccardi M., Di Pietro R., Palanques M., Vila J. Computer Networks 57(2): 422-435, 2013. Type: Article
Malware has become an underground industry, rapidly evolving in response to attempts by computer security experts and organizations to keep it in check. One of the most notorious examples of this pattern is Zeus malware, and specifical...
Jul 30 2013
Automatic malware analysis: an emulator based approach
Yin H., Song D., Springer Publishing Company, Incorporated, New York, NY, 2013. 82 pp. Type: Book (978-1-461455-22-6)
Malware refers to software written with malicious intent. It is virtually impossible to use a computer these days without being affected by this problem and spending significant effort to protect against the threats it presents. The sp...
May 23 2013
A multi-level grey evaluation model for harms of computer virus
Liu M., Han L., Peng B., Zheng C. ISPAW 2011 (Proceedings of the 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, Busan, Korea, May 26-28, 2011) 21-26, 2011. Type: Proceedings
Ensuring antivirus security is a mission-critical task for enterprises in view of the increasing number of malicious attacks and their destructive potential. The authors of this paper focus on the problem of evaluating the potential ha...
Nov 9 2012
Practical malware analysis: the hands-on guide to dissecting malicious software
Sikorski M., Honig A., No Starch Press, San Francisco, CA, 2012. 800 pp. Type: Book (978-1-593272-90-6)
An important topic for system security is addressed in this book. The analysis of malicious software is essential for incident response and digital forensics, and requires both advanced technical skills and operational process experien...
Jul 12 2012
A retrovirus inspired algorithm for virus detection & optimization
Edge K., Lamont G., Raines R. Genetic and evolutionary computation (Proceedings of the 8th Annual Conference on Genetic and Evolutionary Computation, Seattle, Washington, Jul 8-12, 2006) 103-110, 2006. Type: Proceedings
Virus attacks are a fatal threat to all computing systems. Currently, most virus detection methods are based on searching for a virus signature in a suspicious file, to determine if the file contains a specific virus. However, if the s...
Jun 13 2007
The art of computer virus research and defense
Szor P., Addison-Wesley Professional, Boston, MA, 2005. 744 pp. Type: Book (9780321304544), Reviews: (2 of 2)
When someone as knowledgeable about computer viruses as Symantec’s chief antivirus researcher writes a book on the subject, it is expected that the resulting work will be authoritative; Peter Szor’s work is that and...
Jun 21 2006
The art of computer virus research and defense
Szor P., Addison-Wesley Professional, Boston, MA, 2005. 744 pp. Type: Book (9780321304544), Reviews: (1 of 2)
Viruses have come a long way since their first incarnations in the 1980s. What used to be an annoyance to computer users who would share floppy disks with one another has become a global threat. Millions, if not billions, of dollars in...
Apr 27 2006
Managing cyber threats: issues, approaches, and challenges (Massive Computing)
Kumar V. (ed), Srivastava J., Lazarevic A., Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 330 pp. Type: Book (9780387242262)
Few information systems-related issues have generated as much interest, agony, and damage to local or federal organizations, businesses, and individuals as cyber threats—that is, security violations, identity thefts, unau...
Oct 26 2005
Intrusion detection in virtual machine environments
Laureano M., Maziero C., Jamhour E. EUROMICRO (Proceedings of the 30th EUROMICRO Conference (EUROMICRO’04), Rennes, France, 520-525, 2004. Type: Proceedings
Detecting intrusions in operating systems has been a subject of academic and industrial research for quite some time. Such intrusion detection systems fall into two broad categories: network-based and host-based. Host-based intrusion d...
Sep 19 2005
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy