Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Evan Joshua"'
Publikováno v:
Khazanah Informatika, Vol 6, Iss 1, Pp 26-32 (2020)
Various techniques have been developed to detect cyber malware attacks, such as behavior based method which utilizes the analysis of permissions and system calls made by a process. However, this technique cannot handle the types of malware that conti
Externí odkaz:
https://doaj.org/article/a4892910a23342e7bd5d459eb29a87ed
Publikováno v:
Journal of Food Technology & Industry / Jurnal Teknologi & Industri Pangan. 2020, Vol. 31 Issue 2, p188-196. 9p.
Publikováno v:
Khazanah Informatika, Vol 6, Iss 1, Pp 26-32 (2020)
Various techniques have been developed to detect cyber malware attacks, such as behavior based method which utilizes the analysis of permissions and system calls made by a process. However, this technique cannot handle the types of malware that conti
Publikováno v:
Proceedings of the International Conferences on Information System and Technology.