Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Management Of Computing And Information Systems (K.6) > Security and Protection (K.6.5) > Invasive Software (K.6.5...)  
 
Options:
 
  1-10 of 32 Reviews about "Invasive Software (K.6.5...)": Date Reviewed
  A novel malware analysis for malware detection and classification using machine learning algorithms
Sethi K., Chaudhary S., Tripathy B., Bera P.  SIN 2017 (Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, India, Oct 13-15, 2017) 107-113, 2017.  Type: Proceedings

The authors describe a system that identifies malware. The system works both at the macro level, which distinguishes malware from clean software, and at the micro level, which distinguishes between types of malware, for example, Trojan...

Nov 8 2018
  Titans’ revenge: detecting Zeus via its own flaws
Riccardi M., Di Pietro R., Palanques M., Vila J. Computer Networks 57(2): 422-435, 2013.  Type: Article

Malware has become an underground industry, rapidly evolving in response to attempts by computer security experts and organizations to keep it in check. One of the most notorious examples of this pattern is Zeus malware, and specifical...

Jul 30 2013
  Automatic malware analysis: an emulator based approach
Yin H., Song D., Springer Publishing Company, Incorporated, New York, NY, 2013. 82 pp.  Type: Book (978-1-461455-22-6)

Malware refers to software written with malicious intent. It is virtually impossible to use a computer these days without being affected by this problem and spending significant effort to protect against the threats it presents. The sp...

May 23 2013
  A multi-level grey evaluation model for harms of computer virus
Liu M., Han L., Peng B., Zheng C.  ISPAW 2011 (Proceedings of the 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, Busan, Korea, May 26-28, 2011) 21-26, 2011.  Type: Proceedings

Ensuring antivirus security is a mission-critical task for enterprises in view of the increasing number of malicious attacks and their destructive potential. The authors of this paper focus on the problem of evaluating the potential ha...

Nov 9 2012
  Practical malware analysis: the hands-on guide to dissecting malicious software
Sikorski M., Honig A., No Starch Press, San Francisco, CA, 2012. 800 pp.  Type: Book (978-1-593272-90-6)

An important topic for system security is addressed in this book. The analysis of malicious software is essential for incident response and digital forensics, and requires both advanced technical skills and operational process experien...

Jul 12 2012
  A retrovirus inspired algorithm for virus detection & optimization
Edge K., Lamont G., Raines R.  Genetic and evolutionary computation (Proceedings of the 8th Annual Conference on Genetic and Evolutionary Computation, Seattle, Washington, Jul 8-12, 2006) 103-110, 2006.  Type: Proceedings

Virus attacks are a fatal threat to all computing systems. Currently, most virus detection methods are based on searching for a virus signature in a suspicious file, to determine if the file contains a specific virus. However, if the s...

Jun 13 2007
  The art of computer virus research and defense
Szor P., Addison-Wesley Professional, Boston, MA, 2005. 744 pp.  Type: Book (9780321304544), Reviews: (2 of 2)

When someone as knowledgeable about computer viruses as Symantec’s chief antivirus researcher writes a book on the subject, it is expected that the resulting work will be authoritative; Peter Szor’s work is that and...

Jun 21 2006
   The art of computer virus research and defense
Szor P., Addison-Wesley Professional, Boston, MA, 2005. 744 pp.  Type: Book (9780321304544), Reviews: (1 of 2)

Viruses have come a long way since their first incarnations in the 1980s. What used to be an annoyance to computer users who would share floppy disks with one another has become a global threat. Millions, if not billions, of dollars in...

Apr 27 2006
  Managing cyber threats: issues, approaches, and challenges (Massive Computing)
Kumar V. (ed), Srivastava J., Lazarevic A., Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 330 pp.  Type: Book (9780387242262)

Few information systems-related issues have generated as much interest, agony, and damage to local or federal organizations, businesses, and individuals as cyber threats—that is, security violations, identity thefts, unau...

Oct 26 2005
  Intrusion detection in virtual machine environments
Laureano M., Maziero C., Jamhour E.  EUROMICRO (Proceedings of the 30th EUROMICRO Conference (EUROMICRO’04), Rennes, France, 520-525, 2004.  Type: Proceedings

Detecting intrusions in operating systems has been a subject of academic and industrial research for quite some time. Such intrusion detection systems fall into two broad categories: network-based and host-based. Host-based intrusion d...

Sep 19 2005
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy