161
Published 2022
Springer International Publishing
Table of Contents: ... for IIoT Systems -- Malware -- Malware Classification Based on Semi-Supervised Learning -- Malware detected...

162
by Jaswal, Nipun
Published 2019
Packt Publishing
... and malware threat, it's now more important than ever to have skills to investigate network attacks...

163
Published 2022
Packt Publishing
... against malware and make it secure. Upon completion, you will have acquired vast knowledge about cyber...

164
Published 2022
Addison-Wesley Professional

165
by Metula, Erez
Published 2011
Syngress
Table of Contents: ... the Author; Part I: Overview; Chapter 1. Introduction; Chapter 2. Managed Code Rootkits; Part II: Malware...

166
Published 2018
Springer International Publishing
Table of Contents: ...Application Marketplace Malware Detection by User Feedback Analysis -- A System for Detecting...

167
by Provos, Niels
Published 2007
Addison-Wesley
Table of Contents: ... honeypots -- 4. Honeyd -- the basics -- 5. Honeyd -- advanced topics -- 6. Collecting malware with honeypots...

168
by Harper, Allen, Regalado, Daniel, Linn, Ryan, Sims, Stephen
Published 2018
McGraw-Hill Education
Table of Contents: ...-generation patch exploitation -- Dissecting mobile malware -- Dissecting ransomware -- ATM malware...

169
by Carvey, Harlan A.
Published 2018
Elsevier Ltd.
Table of Contents: ...Analysis PointsFinding Malware-Windows 7; Analysis Goal; Image Survey; Constructing a Timeline; USB...

170
Published 2023
Springer Nature Switzerland
Table of Contents: ...Attacks and Malware -- Blockchain -- Cryptography and Privacy -- Machine Learning -- Security...

171
Published 2018
Springer International Publishing
Table of Contents: ...Privacy -- Internet misbehavior and protection -- Malware -- Symmetric key cryptography...

172
Published 2014
Springer International Publishing
Table of Contents: ...Encryption -- Cryptanalysis -- Malware analysis -- Privacy and identification systems -- Types...

173
Published 2020
Springer International Publishing
Table of Contents: ...AI Security and Intrusion Detection -- Steganography and Malware -- Application, System...

174
Published 2017
Springer Nature Singapore
Table of Contents: ...Keynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events...

175
Published 2014
Springer International Publishing
Table of Contents: ...Computer security.- Network security -- Authentication -- Malware -- Intrusion detection -- Browser...

176
Published 2014
Springer International Publishing
Table of Contents: ...Security inferences -- Security policies -- Security user interfaces -- Security attacks -- Malware...

177
Published 2015
Springer International Publishing
Table of Contents: ...Malware detection -- Mobile security -- Vulnerability analysis -- Applied cryptography -- Network...

178
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Cloud Investigations -- Malware -- Behavioral -- Law -- New Developments in Digital Forensics...

179
Published 2018
Springer International Publishing
Table of Contents: ... -- Trustworthy Computing -- Malware and Malware Detection -- Testing for Secure...

180
by Dykstra, Josiah
Published 2016
O'Reilly Media
Table of Contents: ... response -- Situational awareness and data analytics -- Cryptography -- Digital forensics -- Malware...