1
Published 2007
Springer US
Table of Contents: ...Overview -- Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 -- Software...

2
by Jiang, Xuxian, Zhou, Yajin
Published 2013
Springer New York
Table of Contents: ...Introduction -- A Survey of Android Malware -- Case Studies -- Discussion -- Additional Reading...

3
Published 2024
Springer International Publishing
Table of Contents: ...Part 1. Android Malware Analysis -- Chapter 1. A Deep Vision-based Multi-Class Classification...

4
by Yin, Heng, Song, Dawn
Published 2013
Springer New York
...Malicious software (i.e., malware) has become a severe threat to interconnected computer systems...

5
by Aycock, John
Published 2006
Springer US
... from malicious software have never been a bigger concern. Computer Viruses and Malware draws together...

6
by Bettany, Andrew, Halsey, Mike
Published 2017
Apress
Table of Contents: ...1. What is Malware? -- 2. Prevention and Defense -- 3. Malware Defense in Depth -- 4. Identifying...

7
by Mohanta, Abhijit, Saldanha, Anoop
Published 2020
Apress
Table of Contents: ...Part 1: Introduction -- Chapter 1. Introduction -- Chapter 2. Malware Analysis Lab Setup -- Part 2...

8
Published 2014
Springer International Publishing
Table of Contents: ... Techniques to Recover Split and Merged Variables).- Identifying Shared Software Components to Support Malware...

9
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware...

11
Published 2015
Springer International Publishing
... of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015. The 17...

12
Published 2021
Springer International Publishing
Table of Contents: ... in Malware via Decompilation and Machine Learning -- SPECULARIZER: Uncovering Speculative Execution Attacks...

13
Published 2017
Springer International Publishing
Table of Contents: ...Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection...

14
Published 2019
Springer International Publishing
Table of Contents: ... of Traffic Signal Infrastructure -- Malware -- Practical Enclave Malware with Intel SGX -- How does Malware...

15
Published 2020
Springer International Publishing
... of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020...

16
Published 2011
Springer Berlin Heidelberg
... of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July...

17
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... -- Malware Detection and Prevention (I) -- Dynamic Binary Instrumentation-Based Framework for Malware Defense...

18
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Phishing Sites -- Protecting the Intranet Against “JavaScript Malware” and Related Attacks -- Intrusion...

19
Published 2005
Springer Berlin Heidelberg
... GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA...

20
Published 2016
Springer International Publishing
Table of Contents: ...Intrusion detection -- Malware analysis -- Vulnerability assessment -- Novel ideas, techniques...