Zobrazeno 1 - 10
of 97
pro vyhledávání: '"DAĞ, Hasan"'
Autor:
Daǧ, Hasan.
Thesis (Ph. D.)--University of Wisconsin--Madison, 1996.
Typescript. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 136-152).
Typescript. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 136-152).
Externí odkaz:
http://catalog.hathitrust.org/api/volumes/oclc/35031860.html
The way we communicate and work has changed significantly with the rise of the Internet. While it has opened up new opportunities, it has also brought about an increase in cyber threats. One common and serious threat is phishing, where cybercriminals
Externí odkaz:
http://arxiv.org/abs/2401.04820
The escalating landscape of cyber threats, characterized by the registration of thousands of new domains daily for large-scale Internet attacks such as spam, phishing, and drive-by downloads, underscores the imperative for innovative detection method
Externí odkaz:
http://arxiv.org/abs/2401.03196
Classification of malware families is crucial for a comprehensive understanding of how they can infect devices, computers, or systems. Thus, malware identification enables security researchers and incident responders to take precautions against malwa
Externí odkaz:
http://arxiv.org/abs/2112.13236
Autor:
Düzgün, Berkant, Çayır, Aykut, Demirkıran, Ferhat, Kahya, Ceyda Nur, Gençaydın, Buket, Dağ, Hasan
Nowadays, malware and malware incidents are increasing daily, even with various antivirus systems and malware detection or classification methodologies. Machine learning techniques have been the main focus of the security experts to detect malware an
Externí odkaz:
http://arxiv.org/abs/2111.15205
Behavior of a malware varies with respect to malware types. Therefore,knowing type of a malware affects strategies of system protection softwares. Many malware type classification models empowered by machine and deep learning achieve superior accurac
Externí odkaz:
http://arxiv.org/abs/1912.10836
Publikováno v:
In Computers & Security October 2022 121
Publikováno v:
In Computers & Security March 2021 102
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.