1
by Skoudis, Ed, Zeltser, Lenny
Published 2003
Prentice Hall PTR
...Malware (Online)...

2
by Babulak, Eduard
Published 2023
IntechOpen
... critical infrastructures worldwide. These cyberattacks are often triggered by malware and ransomware...

3
by Aquilina, James M.
Published 2008
Syngress Pub.
Table of Contents: ...Ch. 1. Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System...

4
by van Eeten, Michel J. G.
Published 2008
OECD Publishing
...Economie du "Malware" : décisions de sécurité, incitations et externalités / Michel J. G., van...

5
Published 2007
Springer US
Table of Contents: ...Overview -- Malware Evolution: A Snapshot of Threats and Countermeasures in 2005 -- Software...

6
by Jiang, Xuxian, Zhou, Yajin
Published 2013
Springer New York
Table of Contents: ...Introduction -- A Survey of Android Malware -- Case Studies -- Discussion -- Additional Reading...

7
Published 2024
Springer International Publishing
Table of Contents: ...Part 1. Android Malware Analysis -- Chapter 1. A Deep Vision-based Multi-Class Classification...

8
by Molinari, Shane
Published 2023
Packt Publishing Ltd.
Table of Contents: ...Transforming a malware binary into a topological space -- Homology -- Persistence homology...

9
Published 2022
Assemble You
Subjects: ...Malware (Computer software) / http://id.loc.gov/authorities/subjects/sh2009005103...

10
by Yin, Heng, Song, Dawn
Published 2013
Springer New York
...Malicious software (i.e., malware) has become a severe threat to interconnected computer systems...

11
by Aycock, John
Published 2006
Springer US
... from malicious software have never been a bigger concern. Computer Viruses and Malware draws together...

12
by Oktavianto, Digit
Published 2013
Packt Publishing
Table of Contents: ...:Using Cuckoo Sandbox to Analyze a Sample Malware; Starting Cuckoo; Submitting malware samples to Cuckoo...

13
by Saxe, Joshua, Sanders, Hillary
Published 2018
No Starch Press
Table of Contents: ... and Underfitting -- Major Types of Machine Learning Algorithms -- Summary -- 7 EVALUATING MALWARE DETECTION SYSTEMS...

14
by Kleymenov, Alexey
Published 2019
Packt Publishing, Limited
Table of Contents: ...Section 2: Diving Deep into Windows MalwareChapter 2: Basic Static and Dynamic Analysis for x86/x64...

15
by Elisan, Christopher C.
Published 2013
McGraw-Hill
Table of Contents: ... Malware Encounter -- A Brief Overview of the Threat Landscape -- Threat to National Security -- Starting...

16
by K. A., Monnappa
Published 2018
Packt Publishing
Subjects: ...Malware (Computer software) / http://id.loc.gov/authorities/subjects/sh2009005103...

17
by Sikorski, Michael
Published 2012
No Starch Press
Table of Contents: .... 4. Malware functionality -- pt. 5. Anti-reverse-engineering -- pt. 6. Special topics...

18
by Njenga, Munir
Published 2018
Packt
Subjects: ...Malware (Computer software) / http://id.loc.gov/authorities/subjects/sh2009005103...

19
by Elisan, Christopher C.
Published 2015
McGraw-Hill Education
Table of Contents: ... -- Acknowledgments -- Introduction -- Part I Malware Blueprint -- Chapter 1 Malware Analysis 101 -- Malware Analysis...

20
by Barker, Dylan
Published 2021
Packt Publishing, Limited
Subjects: ...Malware (Computer software) / http://id.loc.gov/authorities/subjects/sh2009005103...