Search results

Jump to navigation Jump to search

Page title matches

  • ...ses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. Hi Adleman's proof is perhaps the deepest result in malware [[computability theory (computer science)|computability theory]] to date an ...
    8 KB (1,175 words) - 06:41, 15 February 2025

Page text matches

  • ...ses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. Hi Adleman's proof is perhaps the deepest result in malware [[computability theory (computer science)|computability theory]] to date an ...
    8 KB (1,175 words) - 06:41, 15 February 2025
  • ...r Evident Digital Signatures: Protecting Certification Authorities Against Malware | book-title = Proceedings of the 2nd IEEE International Symposium on Depe ...
    11 KB (1,634 words) - 16:55, 16 April 2024
  • ...for phone hacking include tricking a mobile phone user into downloading [[malware]] that monitors activity on the phone. [[Bluesnarfing]] is an unauthorized ...
    16 KB (2,208 words) - 21:04, 3 August 2024
  • ...irus software]]) blocking of several of their servers owing to spread of [[malware]] from some .bit domains, as well as concerns about potential child pornogr ...
    17 KB (2,356 words) - 23:18, 24 May 2024
  • ====Malware Detection==== ...f |last3=Rokach |first3=Lior |last4=Elovici |first4=Yuval |title=Improving malware detection by applying multi-inducer ensemble |journal=Computational Statist ...
    53 KB (7,534 words) - 06:25, 28 February 2025
  • ...sn=1533-7928}}</ref> attacks in [[computer security]], such as obfuscating malware code within [[network packet]]s or modifying the characteristics of a [[Tra ...Malware and [[Computer viruses|computer virus]] analysis aims to identify malware families, and to generate specific detection signatures.<ref name="Adversar ...
    67 KB (9,432 words) - 13:32, 21 February 2025
  • ...t5=Yu |first5=Xiao |date=2020 |title=You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. |journal=Network and Distributed Systems Secu ...
    42 KB (5,916 words) - 18:10, 22 February 2025
  • ...ers to several privacy risks. For example, there have been identified much malware in the Android app market, which are designed to carry cyber attacks on And ...
    55 KB (7,739 words) - 07:36, 21 December 2024
  • ...e|first6=A.o|title=Towards Explainable Quantum Machine Learning for Mobile Malware Detection and Classification|journal=Applied Sciences|volume=12|number=23|y ...
    89 KB (12,392 words) - 16:22, 26 February 2025
  • ...s continually altered by a [[genetic algorithm]] until it tricked the anti-malware while retaining its ability to damage the target.<ref name=":4" /> ...pping stone for further attacks (e.g., opening a web page hosting drive-by malware)".<ref name=":4" /> ...
    180 KB (23,460 words) - 20:17, 27 February 2025
  • ...nterpol|access-date=25 March 2020|title=INTERPOL cyber research identifies malware threat to virtual currencies}}</ref> ...
    156 KB (19,847 words) - 00:02, 24 February 2025
  • ...wide range of applications, including computer vision, speech recognition, malware dedection, time series analysis in finance, and many others.|access-date=20 ...
    138 KB (19,374 words) - 22:31, 20 February 2025