181
Published 2014
Springer International Publishing
Table of Contents: ... detection and malware mitigation -- Security in hardware -- Systems security -- Network security -- Database...

182
Published 2014
Springer International Publishing
Table of Contents: ... detection and malware mitigation -- Security in hardware -- Systems security -- Network security -- Database...

183
Published 2016
Springer International Publishing
Table of Contents: ... and obfuscation security -- Spam emails, botnets and malware...

184
Published 2022
Springer Nature Singapore
Table of Contents: ...IoT and Cyber Security -- Blockchain Security -- Digital Forensic and Malware Analysis -- 5G...

185
by Jahnel, Benedikt, König, Wolfgang
Published 2020
Birkhäuser
Table of Contents: ...) -- interference -- estimates for probabilities of events of bad service quality (large deviations) -- malware...

186
Published 2020
Springer Nature Singapore
Table of Contents: ..., Botnet and Malware, and DDoS and Intrusion Detection/Prevention -- Ambient Cloud and Edge Computing...

187
Published 2016
Springer International Publishing
Table of Contents: ...Systems security -- Low-level attacks and defenses -- Measurement studies.-Malware analysis...

188
Published 2015
Springer International Publishing
Table of Contents: ...Privacy -- Software security and malware analysis -- Network security and protocols -- Access...

189
by Grubb, Sam
Published 2021
No Starch Press
Table of Contents: ... to Trick You -- How Black Hats Use Malware to Infect Your Computer -- How Black Hats Access Your Accounts...

190
Published 2023
Packt Publishing

191
Published 2022
Springer International Publishing
Table of Contents: ... -- EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries -- Malware...

192
Published 2019
Springer Nature Singapore
Table of Contents: ...Authentication and Access Control -- Malware Analysis -- Network Security -- Privacy Preservation...

193
Published 2021
Springer International Publishing
Table of Contents: ...Blockchain and Federated Learning -- Malware Analysis and Detection -- IoT Security -- Software...

194
Published 2020
Springer International Publishing
Table of Contents: ... -- Malware detection and analysis -- Data mining -- AI....

195
Published 2020
Springer International Publishing
Table of Contents: ... -- Malware detection and analysis -- Data mining -- AI....

196
Published 2020
Springer International Publishing
Table of Contents: ... -- Malware detection and analysis -- Data mining -- AI....

197
Published 2020
Springer International Publishing
Table of Contents: ... -- Malware Analysis -- Network and System Security -- Blockchain -- Security Applications....

198
by Grimes, Roger A.
Published 2005
Apress
Table of Contents: ... Traffic Analysis -- Honeypot Monitoring -- Honeypot Data Analysis -- Malware Code Analysis...

199
by Messier, Ric
Published 2016
Elsevier
Table of Contents: ... -- System configuration -- Web browsing -- Tracking artifacts -- Log files -- Executable programs -- Malware...

200
Published 2019
Springer International Publishing
Table of Contents: ... and Security -- Crypto II: Zero-Knowledge Proofs -- Defenses -- Web Security -- Side Channels -- Malware...