Academic literature on the topic 'Malware fingerprint'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malware fingerprint.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malware fingerprint"
Botas, Alvaro, Ricardo J. Rodríguez, Vicente Matellan, Juan F. Garcia, M. T. Trobajo, and Miguel V. Carriegos. "On Fingerprinting of Public Malware Analysis Services." Logic Journal of the IGPL 28, no. 4 (December 7, 2019): 473–86. http://dx.doi.org/10.1093/jigpal/jzz050.
Full textSingh, Jaiteg, Deepak Thakur, Farman Ali, Tanya Gera, and Kyung Sup Kwak. "Deep Feature Extraction and Classification of Android Malware Images." Sensors 20, no. 24 (December 8, 2020): 7013. http://dx.doi.org/10.3390/s20247013.
Full textBiałczak, Piotr, and Wojciech Mazurczyk. "Hfinger: Malware HTTP Request Fingerprinting." Entropy 23, no. 5 (April 23, 2021): 507. http://dx.doi.org/10.3390/e23050507.
Full text"Visual Detection for Android Malware using Deep Learning." Regular 10, no. 1 (November 10, 2020): 152–56. http://dx.doi.org/10.35940/ijitee.a8132.1110120.
Full textDissertations / Theses on the topic "Malware fingerprint"
Varga, Adam. "Identifikace a charakterizace škodlivého chování v grafech chování." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442388.
Full textBook chapters on the topic "Malware fingerprint"
Botas, Álvaro, Ricardo J. Rodríguez, Vicente Matellán, and Juan F. García. "Empirical Study to Fingerprint Public Malware Analysis Services." In International Joint Conference SOCO’17-CISIS’17-ICEUTE’17 León, Spain, September 6–8, 2017, Proceeding, 589–99. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67180-2_57.
Full textHoffmann, Johannes, Stephan Neumann, and Thorsten Holz. "Mobile Malware Detection Based on Energy Fingerprints — A Dead End?" In Research in Attacks, Intrusions, and Defenses, 348–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41284-4_18.
Full textErichson, N. Benjamin, Dane Taylor, Qixuan Wu, and Michael W. Mahoney. "Noise-Response Analysis of Deep Neural Networks Quantifies Robustness and Fingerprints Structural Malware." In Proceedings of the 2021 SIAM International Conference on Data Mining (SDM), 100–108. Philadelphia, PA: Society for Industrial and Applied Mathematics, 2021. http://dx.doi.org/10.1137/1.9781611976700.12.
Full textConference papers on the topic "Malware fingerprint"
Xiaofang, Ban, Chen Li, Hu Weihua, and Wu Qu. "Malware variant detection using similarity search over content fingerprint." In 2014 26th Chinese Control And Decision Conference (CCDC). IEEE, 2014. http://dx.doi.org/10.1109/ccdc.2014.6852216.
Full text