Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Malware"

ADD TO MY LIST
 
Securing Internet Protocol (IP) Storage: A Case Study

Author(s): Siva Rama Krishnan Somayaji | Ch.A.S Murty
Intelligent System for Worm Detection

Author(s): Ibrahim Farag | Mohammed A. Shouman | Tarek S. Sobh | Heba El-Fiqi
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment

Author(s): Zulkiflee M. | Faizal M.A. | Mohd Fairus I. O. | Nur Azman A | Shahrin S.
Cyberterrorism: The Next Arena of Confrontation

Author(s): George K. Kostopoulos
A New Generic Taxonomy on Hybrid Malware Detection Technique

Author(s): Robiah Y. | Siti Rahayu S. | Mohd Zaki M. | Shahrin S. | Faizal M. A | Marliza R.
SECURITY ISSUES IN CLOUD COMPUTING AND COUNTERMEASURES

Author(s): DANISH JAMIL, | HASSAN ZAKI
Scenario Based Worm Trace Pattern Identification Technique

Author(s): Siti Rahayu S. | Robiah Y., Shahrin S. | Mohd Zaki M. | Irda R. | Faizal M. A.
Case Study On Social Engineering Techniques for Persuasion

Author(s): Mosin Hasan | Nilesh Prajapati | Safvan Vohara
Email Security

Author(s): Kunal Pandove | Amandeep Jindal | Rajinder Kumar
Lightweight C&C based botnet detection using Aho-Corasick NFA

Author(s): Udhayan J | Anitha R | Hamsapriya T
Phishing Secrets: History, Effects, and Countermeasures

Author(s): Antonio San Martino | Xavier Perramon
TrojanURLDetector: A Statistical Analysis Based Trojan Detection Mechanism

Author(s): Liming Wang | Haoying Mu | Lin Xu | Jinglin Chen | Xiyang Liu | Ping Chen
A Recent Survey on Bloom Filters in Network Intrusion Detection Systems

Author(s): K.Saravanan, | Dr.A.Senthil kumar | J.S.Dolian
Secure SOA Web Services

Author(s): Dipen Valani | T.M. Bansod | Aarti Karande
Handsets Malware Threats and Facing Techniques

Author(s): Marwa M. A. Elfattah | Aliaa A.A Youssif, | Ebada Sarhan Ahmed
A Wide Scale Survey on Botnet

Author(s): Amit Kumar Tyagi | G.Aghila
A Comparison of Trojan Virus Behavior in Linux and Windows Operating System

Author(s): Ghossoon. M. W. Al-Saadoon | Hilal M.Y. Al-Bayatt
LSB Replacement Stegnography in an Image using Pseudorandomised Key Generation

Author(s): B. Karthikeyan | V. Vaithiyanathan | B. Thamotharan | M. Gomathymeenakshi | S. Sruti
Handset Malwares Threats Feature Extraction Based on Behavior Analysis

Author(s): Marwa M. A. Efattah | Aliaa A. A. Youssif | Ebada Sarhan Ahmed
Split Personality Malware: A Security Threat

Author(s): Nisha Lalwani | M.B.Chandak | R.V.Dharaskar
Botnet-A Network Threat

Author(s): Sonal P.Patil | Swatantra Kumar
Mobile Viruses

Author(s): Pranav R Shah | Yash Shah | Saurabh Madan
Honeysand: An Open Source Tools based Sandbox Environment for Bot Analysis and Botnet Tracking

Author(s): Saurabh Chamotra | Rakesh Kumar Sehgal | Raj Kamal
An Integrated Framework for Malware Collection and Analysis for Botnet Tracking

Author(s): Rakesh Kumar Sehgal | D. S. Bhilare | Saurabh Chamotra
Social Impact of Internet Access: A Survey

Author(s): Poonam Dhaka | Sandeep Upadhyay | Drashti Dave
Secure Authentication using Anti-Screenshot Virtual Keyboard

Author(s): Ankit Parekh | Ajinkya Pawar | Pratik Munot | Piyush Mantri
Software Tools to Detect Suspicious Files

Author(s): NEAMTU Iosif Mircea
A Novel Approach to Intrusion Detection System using Rough Set Theory and Incremental SVM

Author(s): Ghanshyam Prasad Dubey | Neetesh Gupta | Rakesh K Bhujade
Detection of threats in Honeynet using Honeywall

Author(s): Navita Sharma | Sukhwinder Singh Sran
Android Applications Security

Author(s): Paul POCATILU
Botnet Command Detection using Virtual Honeynet

Author(s): J.S.Bhatia | R.K.Sehgal | Sanjeev Kumar
Protecting Data from the Cyber Theft – a Virulent Disease

Author(s): S. N. Panda | Vikram Mangla
Detecting Malware Variants by Byte Frequency

Author(s): Sheng Yu | Shijie Zhou | Leyuan Liu | Rui Yang | Jiaqing Luo
A New Probability based Analysis for Recognition of Unwanted Emails

Author(s): Shashi Kant Rathore | Palvi Jassi | Basant Agarwal
Cryptovirology: Virus Approach

Author(s): Shivale Saurabh Anandrao
An OS Integrity Measurement System based on Epidemiology

Author(s): K. Venugopal Dasarathy | Samuya Hegde | Radhesh Mohandas
Analysis of Virus Algorithms

Author(s): Jyoti Kalyani | Karanjit S. Kahlon | Harpal Singh | Anu Kalyani

Tango Jona
Tangokurs Rapperswil-Jona

     Save time & money - Smart Internet Solutions