لینک های اصلی
انواع جستجو
ارتباط
پیشنهادها
صفحه اصلی/کامپیوتر
nima20
Mahan_rg
tinoosh3822
Rahele_1372
armiiiii
نمایش
علاقه مندی ها +
A graph-based model for malware detection and classification using system-call groups
30000 تومان
Identification of malicious android app using manifest and opcode features
Semantics-aware detection of targeted attacks: a survey
20000 تومان
Chronicle of a Java Card death
Erratum to: Evolution and characterization of point-of-sale RAM scraping malware
The other guys: automated analysis of marginalized malware
Plaintext side channels in TLS Chiphertex
Experimental analysis of hidden Markov model based secure misuse intrusion trace classification and hacking detection
Secure and light IoT protocol (SLIP) for anti-hacking
Secure information authentication protocol between patients and medical staff in a hospital environment
A study on the service and trend of Fintech security based on text-mining: focused on the data of Korean online news
Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions
Research on financial institutional network partition design for anti-hacking
Multi-context features for detecting malicious programs
Deciphering malware’s use of TLS (without decryption)
A performance evaluation of information security training in public sector
Testing closed source software: computer forensic tool case study
Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis
Intelligent OS X malware threat detection with code inspection
Implementation of dataset staging process with improved security in a new analysis facility for ALICE experiment
Hacking and convergence computing
State of the art of network protocol reverse engineering tools
Trends of anti-analysis operations of malwares observed in API call logs
Automated generation of colluding apps for experimental research
An evaluation method for secure virtual network embedding algorithms
Secure access policy for efficient resource in mobile computing environment
Detecting stealth DHCP starvation attack using machine learning approach
Constructing a secure hacking-resistant IoT U-healthcare environment
Structural analysis of binary executable headers for malware detection optimization
Function development for appraising brittleness of intact rocks using genetic programming and non‑linear multiple regression models
اشتراک در خبرنامه ما
و دریافت آخرین اخبار و پیشنهادات