Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Gheorghe Hajmasan"'
Publikováno v:
NextComp
For a long time, the most important approach for detecting malicious applications was the use of static, hash-based signatures. This approach provides a fast response time, has a low performance overhead and is very stable due to its simplicity. Howe
Publikováno v:
ICT Systems Security and Privacy Protection ISBN: 9783319998275
SEC
SEC
The constant evolution of malware, both in number and complexity, represents a severe threat to individual users and organizations. This is increasing the need for more advanced security solutions, such as dynamic behavior-based malware detection, th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e3929894a5cb00c2870277c344dac48a
https://doi.org/10.1007/978-3-319-99828-2_26
https://doi.org/10.1007/978-3-319-99828-2_26
Publikováno v:
2017 5th International Symposium on Digital Forensic and Security (ISDFS).
The number of malicious applications, their diversity and complexity is continuously growing. To provide the best protection against these advanced threats, there is a need to develop proactive detection solutions, that are able to detect malware bas
Publikováno v:
ICT Systems Security and Privacy Protection ISBN: 9783319584683
SEC
SEC
Fueled by a recent boost in revenue, cybercriminals are developing increasingly sophisticated and advanced malicious applications. This new generation of malware is able to avoid most of the existing detection methods. Even behavioral detection solut
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dc0e0459570d82b2d8c8fab72a514c25
https://doi.org/10.1007/978-3-319-58469-0_3
https://doi.org/10.1007/978-3-319-58469-0_3