Keywords: بد افزار; Cyber attacks; Advanced persistent threat; Malware; Intrusion detection system; Alert correlation; Machine learning;
مقالات ISI بد افزار (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: بد افزار; Feature Selection Technique; Malware; Malware Detection System; Machine Learning; Portable Executable Files;
Keywords: بد افزار; Security; Privacy; Streaming; Malware; IoT;
Keywords: بد افزار; Hybrid analysis; Bytecode weaving; Instrumentation; Dynamic execution; Android; Malware; Dataflow;
Keywords: بد افزار; Network security; Malware; Visual analysis; Deep learning;
Keywords: بد افزار; Malware; Clustering; Dynamic analysis; Probabilistic modeling; Multiple instance learning;
Keywords: بد افزار; Malware; Time series analysis; Community detection; Early detection; Service provider;
Keywords: بد افزار; Malware; Dormant functionality; Malware evasion detection; Analysis evasion malware sandbox; AEMS; Malware attribute enumeration;
Keywords: بد افزار; Malware; Machine learning; Self organising maps; Intrusion detection; Data science; Security operation centre;
Keywords: بد افزار; Dependency graph; Dynamic taint analysis; Malware; Security; System call;
Keywords: بد افزار; Malware; Android permissions; Ontology; Bags of graphs; Machine learning; Discriminant features;
Keywords: بد افزار; Malware; Dynamic analysis; Sandboxing; Multiple instance learning; Classification; Random forest;
Keywords: بد افزار; Anomalies; Malware; Mobile devices; Intrusion detection; Pattern recognition; Sequence alignment;
Keywords: بد افزار; Android security; User experience and expectations; Malware; Usability; Risk analysis; User-centric devices;
Keywords: بد افزار; Android; Collusion; Malware; MoPlus;
Keywords: بد افزار; Email; Detection; Machine learning; Analysis; Malware; Features;
Keywords: بد افزار; Malware; Polymorphic virus; Metamorphic virus; Mutation; Dynamically executed contents; Packing techniques; Binary-based control; Flow graph; Lazy-binding CFG; Deep learning;
Keywords: بد افزار; Technical threat intelligence; Indicators of compromise (IOC); Malware; Trust; Reputation; Ontologies; Cyber crime; Preventative strategies; Risk analysis; Threat sharing;
Keywords: بد افزار; Obfuscation; Android; Model checking; Formal methods; Malware;
Keywords: بد افزار; Malware; Dynamic analysis; Cuckoo sandbox;
Keywords: بد افزار; Memory forensics; Computer forensics; Memory analysis; Incident response; Malware;
Keywords: بد افزار; Malware; Node-level epidemic model; Dynamic malware containment; Optimal control;
Keywords: بد افزار; Communication networks; Malware; Smart grids; Cyber-physical systems; Cyber attacks;
Keywords: بد افزار; Alert correlation; Anomalies; Intrusion detection system; Malware; Network; Payload;
Keywords: بد افزار; Measurement; Analysis; Modeling; Malware; Malware download site;
Keywords: بد افزار; Memory analysis; Incident response; Memory Forensics; Compilers; Reverse Engineering; Malware; Linux Forensics; Digital Forensic Triaging;
Keywords: بد افزار; Probing; Malware; Darknet preprocessing; Big data correlation; Cyber security; Cyber intelligence
Keywords: بد افزار; Android; Malware; Multifeature; Collaborative decision fusion
Keywords: بد افزار; Smartphone; Malware; Trojan; Mobile communications security
Keywords: بد افزار; Cybercrime; Malware; Profiling
Keywords: بد افزار; Android; Malware; Obfuscation; Evasion; DexGuard; Dalvik; Entry points; Signatures; Strings; Bytecode
Keywords: بد افزار; Web security; Drive-by download; Malware; E-Commerce directive; Immunities; Internet intermediaries; Hosting providers; ISP; Search engines
Keywords: بد افزار; Smartphone security; Android; Malware; Variant detection; Static analysis; Family signature;
Keywords: بد افزار; Mobile; Applications; Command and Control; Bluetooth; Android; Malware
Keywords: بد افزار; Port 0 probing; Darknet; Malware; Passive DNS; Data correlation;
Keywords: بد افزار; Mobile devices; Android; Malware; Cross-layer interplay; Security; Critical infrastructure;
Keywords: بد افزار; Mathematical model; Computer networks; Malware; Anti-malware; Stability;
Keywords: بد افزار; Trusted computing; TPM attestation; Cloud; Virtual machine monitors; Rootkits; Zero day attacks; Malware;
Keywords: بد افزار; Computer security; Malware; Malware detection; API call graph; API call graph construction algorithm; API call graph matching algorithm
Keywords: بد افزار; Browser extensions; Web security; Malware; Hidden Markov Model; JavaScript
Keywords: بد افزار; Malware; Packer; Anomaly detection; Machine-learning; Computer security
Keywords: بد افزار; Cybersecurity; Malware; Emerging technology trends; Emerging cyber threats; Cyber attacks and countermeasures
Keywords: بد افزار; Cyberattack; Cybersecurity; Target; Best practices; Internet; Malware; Data; Data breach; Security; Lawsuit; Privacy
Keywords: بد افزار; Malware; Persuasion; Human computer interaction; Psychology
AndrODet: An adaptive Android obfuscation detector
Keywords: بد افزار; Obfuscation detection; Android; Machine learning; Malware;
Ransomware behavioural analysis on windows platforms
Keywords: بد افزار; Cryptovirology; Cybersecurity; Intrusion detection; Malware; Ransomware; Win/32;
MalDozer: Automatic framework for android malware detection using deep learning
Keywords: بد افزار; Mobile; Android; Malware; IoT; Deep learning;
Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics
Keywords: بد افزار; Ransomware; Malware; Software-defined networking; Network security;
Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory
Keywords: بد افزار; Ransomware; Volatile memory; Forensics; Memory dumps; Virtual machine; Private cloud; Machine Learning; Detection; Malware;
A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System
Keywords: بد افزار; IFTTT; IoT; Malware; Recipes; Smart Home;