Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Malware). Showing records 1 – 30 of 443 total matches.

[1] [2] [3] [4] [5] … [15]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


NSYSU

1. Zeng, Ling-Ming. Malware Classification Based on File and Registry Activities.

Degree: Master, Information Management, 2012, NSYSU

 Cyber criminals are trying to steal personal information from victimâs machine to acquire more benefits by using malware. Antivirus is the most commonly used tool… (more)

Subjects/Keywords: Malware; Malware Classification; SVM

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zeng, L. (2012). Malware Classification Based on File and Registry Activities. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0912112-145949

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zeng, Ling-Ming. “Malware Classification Based on File and Registry Activities.” 2012. Thesis, NSYSU. Accessed November 26, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0912112-145949.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zeng, Ling-Ming. “Malware Classification Based on File and Registry Activities.” 2012. Web. 26 Nov 2020.

Vancouver:

Zeng L. Malware Classification Based on File and Registry Activities. [Internet] [Thesis]. NSYSU; 2012. [cited 2020 Nov 26]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0912112-145949.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zeng L. Malware Classification Based on File and Registry Activities. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0912112-145949

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Royal Holloway, University of London

2. Jordaney, Roberto. Machine learning techniques for evolving threats.

Degree: PhD, 2019, Royal Holloway, University of London

 Malicious threats pose a serious problem for everyday activities. The number of attacks are always increasing and automatic means of analysis have been employed to… (more)

Subjects/Keywords: machine learning; malware; Malware classification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jordaney, R. (2019). Machine learning techniques for evolving threats. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/machine-learning-techniques-for-evolving-threats(95ea7478-bb25-4fef-93ba-8d1fdcebfe9e).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792930

Chicago Manual of Style (16th Edition):

Jordaney, Roberto. “Machine learning techniques for evolving threats.” 2019. Doctoral Dissertation, Royal Holloway, University of London. Accessed November 26, 2020. https://pure.royalholloway.ac.uk/portal/en/publications/machine-learning-techniques-for-evolving-threats(95ea7478-bb25-4fef-93ba-8d1fdcebfe9e).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792930.

MLA Handbook (7th Edition):

Jordaney, Roberto. “Machine learning techniques for evolving threats.” 2019. Web. 26 Nov 2020.

Vancouver:

Jordaney R. Machine learning techniques for evolving threats. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2019. [cited 2020 Nov 26]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/machine-learning-techniques-for-evolving-threats(95ea7478-bb25-4fef-93ba-8d1fdcebfe9e).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792930.

Council of Science Editors:

Jordaney R. Machine learning techniques for evolving threats. [Doctoral Dissertation]. Royal Holloway, University of London; 2019. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/machine-learning-techniques-for-evolving-threats(95ea7478-bb25-4fef-93ba-8d1fdcebfe9e).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792930

3. Akiyama, Mitsuaki. Study on High Interaction Client Honeypot for Infiltrative Intrusion Detection : 能動的侵入検知のための高対話型クライアントハニーポットの研究; ノウドウテキ シンニュウ ケンチ ノ タメ ノ コウタイワガタ クライアント ハニーポット ノ ケンキュウ.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: malware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Akiyama, M. (n.d.). Study on High Interaction Client Honeypot for Infiltrative Intrusion Detection : 能動的侵入検知のための高対話型クライアントハニーポットの研究; ノウドウテキ シンニュウ ケンチ ノ タメ ノ コウタイワガタ クライアント ハニーポット ノ ケンキュウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/8812

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Akiyama, Mitsuaki. “Study on High Interaction Client Honeypot for Infiltrative Intrusion Detection : 能動的侵入検知のための高対話型クライアントハニーポットの研究; ノウドウテキ シンニュウ ケンチ ノ タメ ノ コウタイワガタ クライアント ハニーポット ノ ケンキュウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed November 26, 2020. http://hdl.handle.net/10061/8812.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Akiyama, Mitsuaki. “Study on High Interaction Client Honeypot for Infiltrative Intrusion Detection : 能動的侵入検知のための高対話型クライアントハニーポットの研究; ノウドウテキ シンニュウ ケンチ ノ タメ ノ コウタイワガタ クライアント ハニーポット ノ ケンキュウ.” Web. 26 Nov 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Akiyama M. Study on High Interaction Client Honeypot for Infiltrative Intrusion Detection : 能動的侵入検知のための高対話型クライアントハニーポットの研究; ノウドウテキ シンニュウ ケンチ ノ タメ ノ コウタイワガタ クライアント ハニーポット ノ ケンキュウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Nov 26]. Available from: http://hdl.handle.net/10061/8812.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Akiyama M. Study on High Interaction Client Honeypot for Infiltrative Intrusion Detection : 能動的侵入検知のための高対話型クライアントハニーポットの研究; ノウドウテキ シンニュウ ケンチ ノ タメ ノ コウタイワガタ クライアント ハニーポット ノ ケンキュウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/8812

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Kennesaw State University

4. Ko, Euiseong. Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis.

Degree: MSCS, Computer Science, 2018, Kennesaw State University

Malware is dramatically increasing its viability while hiding its malicious intent and/or behavior by employing ciphers. So far, many efforts have been made to… (more)

Subjects/Keywords: Malware Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ko, E. (2018). Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis. (Thesis). Kennesaw State University. Retrieved from https://digitalcommons.kennesaw.edu/cs_etd/14

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ko, Euiseong. “Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis.” 2018. Thesis, Kennesaw State University. Accessed November 26, 2020. https://digitalcommons.kennesaw.edu/cs_etd/14.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ko, Euiseong. “Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis.” 2018. Web. 26 Nov 2020.

Vancouver:

Ko E. Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis. [Internet] [Thesis]. Kennesaw State University; 2018. [cited 2020 Nov 26]. Available from: https://digitalcommons.kennesaw.edu/cs_etd/14.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ko E. Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis. [Thesis]. Kennesaw State University; 2018. Available from: https://digitalcommons.kennesaw.edu/cs_etd/14

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Debrecen

5. Kingsley Ezechi, Azuama. Detecting and combating Malware .

Degree: DE – TEK – Informatikai Kar, 2011, University of Debrecen

 This master thesis observes a process improvement on detecting Malware, although new methods for combating malware have been developed, it is still difficult to communicate… (more)

Subjects/Keywords: Malware; Internet

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kingsley Ezechi, A. (2011). Detecting and combating Malware . (Thesis). University of Debrecen. Retrieved from http://hdl.handle.net/2437/105305

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kingsley Ezechi, Azuama. “Detecting and combating Malware .” 2011. Thesis, University of Debrecen. Accessed November 26, 2020. http://hdl.handle.net/2437/105305.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kingsley Ezechi, Azuama. “Detecting and combating Malware .” 2011. Web. 26 Nov 2020.

Vancouver:

Kingsley Ezechi A. Detecting and combating Malware . [Internet] [Thesis]. University of Debrecen; 2011. [cited 2020 Nov 26]. Available from: http://hdl.handle.net/2437/105305.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kingsley Ezechi A. Detecting and combating Malware . [Thesis]. University of Debrecen; 2011. Available from: http://hdl.handle.net/2437/105305

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. ARCOVERDE, Henrique Ferraz. Malwares brasileiros: técnicas, alvos e tendências .

Degree: 2013, Universidade Federal de Pernambuco

 Diante de uma sociedade que cada vez mais se alicerça em atividades digitais, é notória a disponibilização de serviços, outrora presentes quase que exclusivamente através… (more)

Subjects/Keywords: Segurança; Malware; Análise de malware; Trojan; Banker

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

ARCOVERDE, H. F. (2013). Malwares brasileiros: técnicas, alvos e tendências . (Thesis). Universidade Federal de Pernambuco. Retrieved from http://repositorio.ufpe.br/handle/123456789/11832

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

ARCOVERDE, Henrique Ferraz. “Malwares brasileiros: técnicas, alvos e tendências .” 2013. Thesis, Universidade Federal de Pernambuco. Accessed November 26, 2020. http://repositorio.ufpe.br/handle/123456789/11832.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

ARCOVERDE, Henrique Ferraz. “Malwares brasileiros: técnicas, alvos e tendências .” 2013. Web. 26 Nov 2020.

Vancouver:

ARCOVERDE HF. Malwares brasileiros: técnicas, alvos e tendências . [Internet] [Thesis]. Universidade Federal de Pernambuco; 2013. [cited 2020 Nov 26]. Available from: http://repositorio.ufpe.br/handle/123456789/11832.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

ARCOVERDE HF. Malwares brasileiros: técnicas, alvos e tendências . [Thesis]. Universidade Federal de Pernambuco; 2013. Available from: http://repositorio.ufpe.br/handle/123456789/11832

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. Ferreira, Ricardo Sérgio Freitas. Captura, análise e identificação de malware: caso de estudo.

Degree: 2015, RCAAP

Dissertação de Mestrado em Tecnologias da Informação e Comunicação

Atualmente a proliferação de software malicioso (malware) é enorme, tornando o malware num dos maiores problemas… (more)

Subjects/Keywords: Software; Malware; Honeypots

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ferreira, R. S. F. (2015). Captura, análise e identificação de malware: caso de estudo. (Thesis). RCAAP. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:http://repositorio.utad.pt/:10348/4563

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ferreira, Ricardo Sérgio Freitas. “Captura, análise e identificação de malware: caso de estudo.” 2015. Thesis, RCAAP. Accessed November 26, 2020. http://www.rcaap.pt/detail.jsp?id=oai:http://repositorio.utad.pt/:10348/4563.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ferreira, Ricardo Sérgio Freitas. “Captura, análise e identificação de malware: caso de estudo.” 2015. Web. 26 Nov 2020.

Vancouver:

Ferreira RSF. Captura, análise e identificação de malware: caso de estudo. [Internet] [Thesis]. RCAAP; 2015. [cited 2020 Nov 26]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:http://repositorio.utad.pt/:10348/4563.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ferreira RSF. Captura, análise e identificação de malware: caso de estudo. [Thesis]. RCAAP; 2015. Available from: http://www.rcaap.pt/detail.jsp?id=oai:http://repositorio.utad.pt/:10348/4563

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

8. Jadhav, Suyash. Advance Android PHAs/Malware Detection Techniques by Utilizing Signature Data, Behavioral Patterns and Machine Learning.

Degree: MS, Department of Computing Security (GCCIS), 2016, Rochester Institute of Technology

  During the last decade mobile phones and tablets evolved into smart devices with enormous computing power and storage capacity packed in a pocket size.… (more)

Subjects/Keywords: Android; Malware; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jadhav, S. (2016). Advance Android PHAs/Malware Detection Techniques by Utilizing Signature Data, Behavioral Patterns and Machine Learning. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9419

Chicago Manual of Style (16th Edition):

Jadhav, Suyash. “Advance Android PHAs/Malware Detection Techniques by Utilizing Signature Data, Behavioral Patterns and Machine Learning.” 2016. Masters Thesis, Rochester Institute of Technology. Accessed November 26, 2020. https://scholarworks.rit.edu/theses/9419.

MLA Handbook (7th Edition):

Jadhav, Suyash. “Advance Android PHAs/Malware Detection Techniques by Utilizing Signature Data, Behavioral Patterns and Machine Learning.” 2016. Web. 26 Nov 2020.

Vancouver:

Jadhav S. Advance Android PHAs/Malware Detection Techniques by Utilizing Signature Data, Behavioral Patterns and Machine Learning. [Internet] [Masters thesis]. Rochester Institute of Technology; 2016. [cited 2020 Nov 26]. Available from: https://scholarworks.rit.edu/theses/9419.

Council of Science Editors:

Jadhav S. Advance Android PHAs/Malware Detection Techniques by Utilizing Signature Data, Behavioral Patterns and Machine Learning. [Masters Thesis]. Rochester Institute of Technology; 2016. Available from: https://scholarworks.rit.edu/theses/9419


George Mason University

9. Dharmdasani, Hitesh. Botnets and Crypto Currency - Effects of Botnets on the Bitcoin Ecosystem .

Degree: 2013, George Mason University

 Nearly every aspect of a hacked computer and a users online life can be and has been commoditized. Recent trends into crypto currencies have made… (more)

Subjects/Keywords: bitcoin; botnets; malware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dharmdasani, H. (2013). Botnets and Crypto Currency - Effects of Botnets on the Bitcoin Ecosystem . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/8636

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dharmdasani, Hitesh. “Botnets and Crypto Currency - Effects of Botnets on the Bitcoin Ecosystem .” 2013. Thesis, George Mason University. Accessed November 26, 2020. http://hdl.handle.net/1920/8636.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dharmdasani, Hitesh. “Botnets and Crypto Currency - Effects of Botnets on the Bitcoin Ecosystem .” 2013. Web. 26 Nov 2020.

Vancouver:

Dharmdasani H. Botnets and Crypto Currency - Effects of Botnets on the Bitcoin Ecosystem . [Internet] [Thesis]. George Mason University; 2013. [cited 2020 Nov 26]. Available from: http://hdl.handle.net/1920/8636.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dharmdasani H. Botnets and Crypto Currency - Effects of Botnets on the Bitcoin Ecosystem . [Thesis]. George Mason University; 2013. Available from: http://hdl.handle.net/1920/8636

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Florida

10. Bai, Yunkai. Miniature Platform for Side Channel Analysis and Remote Attestation.

Degree: MS, Electrical and Computer Engineering, 2019, University of Florida

 With the growth of IoT devices, more and more IoT devices are targeted with malware attacks. This thesis proposes a new, miniature platform to monitor… (more)

Subjects/Keywords: attacks  – malware  – malwareattacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bai, Y. (2019). Miniature Platform for Side Channel Analysis and Remote Attestation. (Masters Thesis). University of Florida. Retrieved from https://ufdc.ufl.edu/UFE0055880

Chicago Manual of Style (16th Edition):

Bai, Yunkai. “Miniature Platform for Side Channel Analysis and Remote Attestation.” 2019. Masters Thesis, University of Florida. Accessed November 26, 2020. https://ufdc.ufl.edu/UFE0055880.

MLA Handbook (7th Edition):

Bai, Yunkai. “Miniature Platform for Side Channel Analysis and Remote Attestation.” 2019. Web. 26 Nov 2020.

Vancouver:

Bai Y. Miniature Platform for Side Channel Analysis and Remote Attestation. [Internet] [Masters thesis]. University of Florida; 2019. [cited 2020 Nov 26]. Available from: https://ufdc.ufl.edu/UFE0055880.

Council of Science Editors:

Bai Y. Miniature Platform for Side Channel Analysis and Remote Attestation. [Masters Thesis]. University of Florida; 2019. Available from: https://ufdc.ufl.edu/UFE0055880


George Mason University

11. Aljammaz, Muhammad. Malware Static Analysis Techniques Using a Multidisciplinary Approach .

Degree: 2013, George Mason University

 Most research discussing malware detection completely dismisses signatures as being a thing of the past, accusing signatures of suffering from a weak ability to detect… (more)

Subjects/Keywords: static analysis; system security; computer security; malware; malware analysis; malware detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aljammaz, M. (2013). Malware Static Analysis Techniques Using a Multidisciplinary Approach . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/8378

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Aljammaz, Muhammad. “Malware Static Analysis Techniques Using a Multidisciplinary Approach .” 2013. Thesis, George Mason University. Accessed November 26, 2020. http://hdl.handle.net/1920/8378.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Aljammaz, Muhammad. “Malware Static Analysis Techniques Using a Multidisciplinary Approach .” 2013. Web. 26 Nov 2020.

Vancouver:

Aljammaz M. Malware Static Analysis Techniques Using a Multidisciplinary Approach . [Internet] [Thesis]. George Mason University; 2013. [cited 2020 Nov 26]. Available from: http://hdl.handle.net/1920/8378.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Aljammaz M. Malware Static Analysis Techniques Using a Multidisciplinary Approach . [Thesis]. George Mason University; 2013. Available from: http://hdl.handle.net/1920/8378

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

12. Šrubař, Michal. Analýza síťové komunikace Ransomware: Ransomware Traffic Analysis.

Degree: 2018, Brno University of Technology

 The focus of this work is crypto-ransomware; a variant of malware, an analysis of this malware’s network communication, and the identification of means by which… (more)

Subjects/Keywords: Škodlivý software; Malware; Ransomware; Crypto-malware; HTTP POST Check-in; DNS; WannaCry; Malware lab; TOR.; Malware; Ransomware; Crypto-ransomware; Crypto-malware; HTTP POST Check-in; DNS; WannaCry; Malware lab; TOR.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Šrubař, M. (2018). Analýza síťové komunikace Ransomware: Ransomware Traffic Analysis. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/69476

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Šrubař, Michal. “Analýza síťové komunikace Ransomware: Ransomware Traffic Analysis.” 2018. Thesis, Brno University of Technology. Accessed November 26, 2020. http://hdl.handle.net/11012/69476.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Šrubař, Michal. “Analýza síťové komunikace Ransomware: Ransomware Traffic Analysis.” 2018. Web. 26 Nov 2020.

Vancouver:

Šrubař M. Analýza síťové komunikace Ransomware: Ransomware Traffic Analysis. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2020 Nov 26]. Available from: http://hdl.handle.net/11012/69476.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Šrubař M. Analýza síťové komunikace Ransomware: Ransomware Traffic Analysis. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/69476

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Georgia

13. Vadrevu, Krishna Phani Kumar. Enabling efficient detection and forensic investigation of malicious software downloads.

Degree: 2018, University of Georgia

Malware infections have been on a steady rise recently causing increasing amounts of financial damage and data loss. The advent of techniques like code polymorphism… (more)

Subjects/Keywords: Malware; Malware detection; Malware analysis; Network security; Machine learning; Web security; Computer forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vadrevu, K. P. K. (2018). Enabling efficient detection and forensic investigation of malicious software downloads. (Thesis). University of Georgia. Retrieved from http://hdl.handle.net/10724/37500

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vadrevu, Krishna Phani Kumar. “Enabling efficient detection and forensic investigation of malicious software downloads.” 2018. Thesis, University of Georgia. Accessed November 26, 2020. http://hdl.handle.net/10724/37500.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vadrevu, Krishna Phani Kumar. “Enabling efficient detection and forensic investigation of malicious software downloads.” 2018. Web. 26 Nov 2020.

Vancouver:

Vadrevu KPK. Enabling efficient detection and forensic investigation of malicious software downloads. [Internet] [Thesis]. University of Georgia; 2018. [cited 2020 Nov 26]. Available from: http://hdl.handle.net/10724/37500.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vadrevu KPK. Enabling efficient detection and forensic investigation of malicious software downloads. [Thesis]. University of Georgia; 2018. Available from: http://hdl.handle.net/10724/37500

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

14. Liu, Ming-Che. APT Attack Detection Based on DNS Time Frequency Analysis.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 Recently, malware infection has become one of the most serious threats against information security. Analysis and detection against malware are regarded as an important issue… (more)

Subjects/Keywords: Malware; Traffic Analysis; APT Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, M. (2013). APT Attack Detection Based on DNS Time Frequency Analysis. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Ming-Che. “APT Attack Detection Based on DNS Time Frequency Analysis.” 2013. Thesis, NSYSU. Accessed November 26, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Ming-Che. “APT Attack Detection Based on DNS Time Frequency Analysis.” 2013. Web. 26 Nov 2020.

Vancouver:

Liu M. APT Attack Detection Based on DNS Time Frequency Analysis. [Internet] [Thesis]. NSYSU; 2013. [cited 2020 Nov 26]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu M. APT Attack Detection Based on DNS Time Frequency Analysis. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. Nguyen, Hoai Nam. Malware Propagation and its Impacts in Heterogeneous Ad hoc Wireless Networks: A Novel Framework.

Degree: Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学

Supervisor:Prof. Yoichi Shinoda

情報科学研究科

博士

Subjects/Keywords: malware; network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen, H. N. (n.d.). Malware Propagation and its Impacts in Heterogeneous Ad hoc Wireless Networks: A Novel Framework. (Thesis). Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10119/8861

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nguyen, Hoai Nam. “Malware Propagation and its Impacts in Heterogeneous Ad hoc Wireless Networks: A Novel Framework.” Thesis, Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学. Accessed November 26, 2020. http://hdl.handle.net/10119/8861.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nguyen, Hoai Nam. “Malware Propagation and its Impacts in Heterogeneous Ad hoc Wireless Networks: A Novel Framework.” Web. 26 Nov 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Nguyen HN. Malware Propagation and its Impacts in Heterogeneous Ad hoc Wireless Networks: A Novel Framework. [Internet] [Thesis]. Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学; [cited 2020 Nov 26]. Available from: http://hdl.handle.net/10119/8861.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Nguyen HN. Malware Propagation and its Impacts in Heterogeneous Ad hoc Wireless Networks: A Novel Framework. [Thesis]. Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学; Available from: http://hdl.handle.net/10119/8861

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


San Jose State University

16. Selvin, Vikash Raja Samuel. Malware Scores Based on Image Processing.

Degree: MS, Computer Science, 2017, San Jose State University

Malware analysis can be based on static or dynamic analysis. Static analysis includes signature-based detection and other forms of analysis rely only on features… (more)

Subjects/Keywords: Malware; Image Binaries; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Selvin, V. R. S. (2017). Malware Scores Based on Image Processing. (Masters Thesis). San Jose State University. Retrieved from https://doi.org/10.31979/etd.347x-pf32 ; https://scholarworks.sjsu.edu/etd_projects/546

Chicago Manual of Style (16th Edition):

Selvin, Vikash Raja Samuel. “Malware Scores Based on Image Processing.” 2017. Masters Thesis, San Jose State University. Accessed November 26, 2020. https://doi.org/10.31979/etd.347x-pf32 ; https://scholarworks.sjsu.edu/etd_projects/546.

MLA Handbook (7th Edition):

Selvin, Vikash Raja Samuel. “Malware Scores Based on Image Processing.” 2017. Web. 26 Nov 2020.

Vancouver:

Selvin VRS. Malware Scores Based on Image Processing. [Internet] [Masters thesis]. San Jose State University; 2017. [cited 2020 Nov 26]. Available from: https://doi.org/10.31979/etd.347x-pf32 ; https://scholarworks.sjsu.edu/etd_projects/546.

Council of Science Editors:

Selvin VRS. Malware Scores Based on Image Processing. [Masters Thesis]. San Jose State University; 2017. Available from: https://doi.org/10.31979/etd.347x-pf32 ; https://scholarworks.sjsu.edu/etd_projects/546


San Jose State University

17. Lee, Jared. Compression-Based Analysis of Metamorphic Malware.

Degree: MS, Computer Science, 2014, San Jose State University

  Recent work has presented a technique based on structural entropy measurement as an effective way to detect metamorphic malware. The technique uses two steps,… (more)

Subjects/Keywords: compression; detection; malware; metamorphic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, J. (2014). Compression-Based Analysis of Metamorphic Malware. (Masters Thesis). San Jose State University. Retrieved from https://doi.org/10.31979/etd.g4bn-x6be ; https://scholarworks.sjsu.edu/etd_theses/4428

Chicago Manual of Style (16th Edition):

Lee, Jared. “Compression-Based Analysis of Metamorphic Malware.” 2014. Masters Thesis, San Jose State University. Accessed November 26, 2020. https://doi.org/10.31979/etd.g4bn-x6be ; https://scholarworks.sjsu.edu/etd_theses/4428.

MLA Handbook (7th Edition):

Lee, Jared. “Compression-Based Analysis of Metamorphic Malware.” 2014. Web. 26 Nov 2020.

Vancouver:

Lee J. Compression-Based Analysis of Metamorphic Malware. [Internet] [Masters thesis]. San Jose State University; 2014. [cited 2020 Nov 26]. Available from: https://doi.org/10.31979/etd.g4bn-x6be ; https://scholarworks.sjsu.edu/etd_theses/4428.

Council of Science Editors:

Lee J. Compression-Based Analysis of Metamorphic Malware. [Masters Thesis]. San Jose State University; 2014. Available from: https://doi.org/10.31979/etd.g4bn-x6be ; https://scholarworks.sjsu.edu/etd_theses/4428


Rochester Institute of Technology

18. Tufts, Thomas. Network Based Malware Defense.

Degree: MS, Department of Computing Security (GCCIS), 2011, Rochester Institute of Technology

  This goal of this research was to create a network-based malware quarantine system and test the effectiveness of it on the speed of worm… (more)

Subjects/Keywords: Computer defense; Malware; Nessus; Snort

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tufts, T. (2011). Network Based Malware Defense. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9386

Chicago Manual of Style (16th Edition):

Tufts, Thomas. “Network Based Malware Defense.” 2011. Masters Thesis, Rochester Institute of Technology. Accessed November 26, 2020. https://scholarworks.rit.edu/theses/9386.

MLA Handbook (7th Edition):

Tufts, Thomas. “Network Based Malware Defense.” 2011. Web. 26 Nov 2020.

Vancouver:

Tufts T. Network Based Malware Defense. [Internet] [Masters thesis]. Rochester Institute of Technology; 2011. [cited 2020 Nov 26]. Available from: https://scholarworks.rit.edu/theses/9386.

Council of Science Editors:

Tufts T. Network Based Malware Defense. [Masters Thesis]. Rochester Institute of Technology; 2011. Available from: https://scholarworks.rit.edu/theses/9386


Penn State University

19. Lageman, Nathaniel John. BinDNN: Resilient Function Matching Using Deep Learning.

Degree: 2016, Penn State University

 Determining if two functions taken from different compiled binaries originate from the same function in the source code has many applications to malware reverse engineering.… (more)

Subjects/Keywords: reverse engineering; malware; deep learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lageman, N. J. (2016). BinDNN: Resilient Function Matching Using Deep Learning. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/12477njl5114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lageman, Nathaniel John. “BinDNN: Resilient Function Matching Using Deep Learning.” 2016. Thesis, Penn State University. Accessed November 26, 2020. https://submit-etda.libraries.psu.edu/catalog/12477njl5114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lageman, Nathaniel John. “BinDNN: Resilient Function Matching Using Deep Learning.” 2016. Web. 26 Nov 2020.

Vancouver:

Lageman NJ. BinDNN: Resilient Function Matching Using Deep Learning. [Internet] [Thesis]. Penn State University; 2016. [cited 2020 Nov 26]. Available from: https://submit-etda.libraries.psu.edu/catalog/12477njl5114.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lageman NJ. BinDNN: Resilient Function Matching Using Deep Learning. [Thesis]. Penn State University; 2016. Available from: https://submit-etda.libraries.psu.edu/catalog/12477njl5114

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

20. Huang, Heqing. A STUDY OF SYSTEM VULNERABILITY AND MALWARE ON ANDROID.

Degree: 2016, Penn State University

 The increasing popularity of mobile devices (e.g., Android, iOS and etc.) attracts both normal users and malware writers. In this dissertation, we conduct research on… (more)

Subjects/Keywords: Android Security; Vulnerability; Malware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, H. (2016). A STUDY OF SYSTEM VULNERABILITY AND MALWARE ON ANDROID. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/28717

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Heqing. “A STUDY OF SYSTEM VULNERABILITY AND MALWARE ON ANDROID.” 2016. Thesis, Penn State University. Accessed November 26, 2020. https://submit-etda.libraries.psu.edu/catalog/28717.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Heqing. “A STUDY OF SYSTEM VULNERABILITY AND MALWARE ON ANDROID.” 2016. Web. 26 Nov 2020.

Vancouver:

Huang H. A STUDY OF SYSTEM VULNERABILITY AND MALWARE ON ANDROID. [Internet] [Thesis]. Penn State University; 2016. [cited 2020 Nov 26]. Available from: https://submit-etda.libraries.psu.edu/catalog/28717.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang H. A STUDY OF SYSTEM VULNERABILITY AND MALWARE ON ANDROID. [Thesis]. Penn State University; 2016. Available from: https://submit-etda.libraries.psu.edu/catalog/28717

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

21. Chuang, Pan-Jo. Ransomware Detection by Monitoring I/O Requests.

Degree: Master, Information Management, 2017, NSYSU

 In recent years, the major security companies all report ransomware as one of major parts in their annual threat analysis reports. Large viruses spread network… (more)

Subjects/Keywords: Malware; Dynamic Detection; Ransomware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chuang, P. (2017). Ransomware Detection by Monitoring I/O Requests. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729117-230140

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chuang, Pan-Jo. “Ransomware Detection by Monitoring I/O Requests.” 2017. Thesis, NSYSU. Accessed November 26, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729117-230140.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chuang, Pan-Jo. “Ransomware Detection by Monitoring I/O Requests.” 2017. Web. 26 Nov 2020.

Vancouver:

Chuang P. Ransomware Detection by Monitoring I/O Requests. [Internet] [Thesis]. NSYSU; 2017. [cited 2020 Nov 26]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729117-230140.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chuang P. Ransomware Detection by Monitoring I/O Requests. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729117-230140

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

22. 冨沢, 篤史. マルウェアによるパッカー利用の解析 [課題研究報告書].

Degree: Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学

Supervisor:小川 瑞史

情報科学研究科

修士

Subjects/Keywords: マルウェア; malware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

冨沢, . (n.d.). マルウェアによるパッカー利用の解析 [課題研究報告書]. (Thesis). Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10119/14807

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

冨沢, 篤史. “マルウェアによるパッカー利用の解析 [課題研究報告書].” Thesis, Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学. Accessed November 26, 2020. http://hdl.handle.net/10119/14807.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

冨沢, 篤史. “マルウェアによるパッカー利用の解析 [課題研究報告書].” Web. 26 Nov 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

冨沢 . マルウェアによるパッカー利用の解析 [課題研究報告書]. [Internet] [Thesis]. Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学; [cited 2020 Nov 26]. Available from: http://hdl.handle.net/10119/14807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

冨沢 . マルウェアによるパッカー利用の解析 [課題研究報告書]. [Thesis]. Japan Advanced Institute of Science and Technology / 北陸先端科学技術大学院大学; Available from: http://hdl.handle.net/10119/14807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of Minnesota

23. Mekky, Hesham. Securing and Protecting Enterprise Networks via Data-driven Analytics and Application-aware SDN.

Degree: PhD, Computer Science, 2016, University of Minnesota

 The popularity of online services, such as social networks and online banking, has made them a popular platform for attackers. Cybercriminals leverage them to spread… (more)

Subjects/Keywords: Malware; Networking; NFV; SDN; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mekky, H. (2016). Securing and Protecting Enterprise Networks via Data-driven Analytics and Application-aware SDN. (Doctoral Dissertation). University of Minnesota. Retrieved from http://hdl.handle.net/11299/183348

Chicago Manual of Style (16th Edition):

Mekky, Hesham. “Securing and Protecting Enterprise Networks via Data-driven Analytics and Application-aware SDN.” 2016. Doctoral Dissertation, University of Minnesota. Accessed November 26, 2020. http://hdl.handle.net/11299/183348.

MLA Handbook (7th Edition):

Mekky, Hesham. “Securing and Protecting Enterprise Networks via Data-driven Analytics and Application-aware SDN.” 2016. Web. 26 Nov 2020.

Vancouver:

Mekky H. Securing and Protecting Enterprise Networks via Data-driven Analytics and Application-aware SDN. [Internet] [Doctoral dissertation]. University of Minnesota; 2016. [cited 2020 Nov 26]. Available from: http://hdl.handle.net/11299/183348.

Council of Science Editors:

Mekky H. Securing and Protecting Enterprise Networks via Data-driven Analytics and Application-aware SDN. [Doctoral Dissertation]. University of Minnesota; 2016. Available from: http://hdl.handle.net/11299/183348


Colorado School of Mines

24. Hughes, Michael B. Similarity hashing of malware on IoT devices.

Degree: MS(M.S.), Computer Science, 2019, Colorado School of Mines

 A security threat to enterprise networks is the malware that exists on IoT devices which is rarely controlled at the same level that are observed… (more)

Subjects/Keywords: IoT; Similarity; Malware; Hash

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hughes, M. B. (2019). Similarity hashing of malware on IoT devices. (Masters Thesis). Colorado School of Mines. Retrieved from http://hdl.handle.net/11124/173074

Chicago Manual of Style (16th Edition):

Hughes, Michael B. “Similarity hashing of malware on IoT devices.” 2019. Masters Thesis, Colorado School of Mines. Accessed November 26, 2020. http://hdl.handle.net/11124/173074.

MLA Handbook (7th Edition):

Hughes, Michael B. “Similarity hashing of malware on IoT devices.” 2019. Web. 26 Nov 2020.

Vancouver:

Hughes MB. Similarity hashing of malware on IoT devices. [Internet] [Masters thesis]. Colorado School of Mines; 2019. [cited 2020 Nov 26]. Available from: http://hdl.handle.net/11124/173074.

Council of Science Editors:

Hughes MB. Similarity hashing of malware on IoT devices. [Masters Thesis]. Colorado School of Mines; 2019. Available from: http://hdl.handle.net/11124/173074


University of Florida

25. Sun, Ruimin. Leveraging Uncertainty to Improve System Security and Reliability.

Degree: PhD, Electrical and Computer Engineering, 2019, University of Florida

 Modern operating systems are designed to be predictable. This improves compatibility among different instances of the system, including older programs running on newer systems. But… (more)

Subjects/Keywords: detection  – malware  – reliability  – security  – system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, R. (2019). Leveraging Uncertainty to Improve System Security and Reliability. (Doctoral Dissertation). University of Florida. Retrieved from https://ufdc.ufl.edu/UFE0054335

Chicago Manual of Style (16th Edition):

Sun, Ruimin. “Leveraging Uncertainty to Improve System Security and Reliability.” 2019. Doctoral Dissertation, University of Florida. Accessed November 26, 2020. https://ufdc.ufl.edu/UFE0054335.

MLA Handbook (7th Edition):

Sun, Ruimin. “Leveraging Uncertainty to Improve System Security and Reliability.” 2019. Web. 26 Nov 2020.

Vancouver:

Sun R. Leveraging Uncertainty to Improve System Security and Reliability. [Internet] [Doctoral dissertation]. University of Florida; 2019. [cited 2020 Nov 26]. Available from: https://ufdc.ufl.edu/UFE0054335.

Council of Science Editors:

Sun R. Leveraging Uncertainty to Improve System Security and Reliability. [Doctoral Dissertation]. University of Florida; 2019. Available from: https://ufdc.ufl.edu/UFE0054335

26. AlMarri, Saeed. A structured approach to malware detection and analysis in digital forensics investigation.

Degree: PhD, 2017, University of Bedfordshire

 Within the World Wide Web (WWW), malware is considered one of the most serious threats to system security with complex system issues caused by malware(more)

Subjects/Keywords: malware; computer security; digital forensics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

AlMarri, S. (2017). A structured approach to malware detection and analysis in digital forensics investigation. (Doctoral Dissertation). University of Bedfordshire. Retrieved from http://hdl.handle.net/10547/622529

Chicago Manual of Style (16th Edition):

AlMarri, Saeed. “A structured approach to malware detection and analysis in digital forensics investigation.” 2017. Doctoral Dissertation, University of Bedfordshire. Accessed November 26, 2020. http://hdl.handle.net/10547/622529.

MLA Handbook (7th Edition):

AlMarri, Saeed. “A structured approach to malware detection and analysis in digital forensics investigation.” 2017. Web. 26 Nov 2020.

Vancouver:

AlMarri S. A structured approach to malware detection and analysis in digital forensics investigation. [Internet] [Doctoral dissertation]. University of Bedfordshire; 2017. [cited 2020 Nov 26]. Available from: http://hdl.handle.net/10547/622529.

Council of Science Editors:

AlMarri S. A structured approach to malware detection and analysis in digital forensics investigation. [Doctoral Dissertation]. University of Bedfordshire; 2017. Available from: http://hdl.handle.net/10547/622529


University of New South Wales

27. Ikram, Muhammad. Analysis and design of secure and privacy preserving systems.

Degree: Electrical Engineering & Telecommunications, 2018, University of New South Wales

 Millions of users employ secure and privacy preserving systems to prevent privacy-intrusive and malicious activities and either to circumvent censorship or access geo-blocked content. Most,… (more)

Subjects/Keywords: Malware; Android; Tracking; VPN; Characterization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ikram, M. (2018). Analysis and design of secure and privacy preserving systems. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/60197 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51296/SOURCE2?view=true

Chicago Manual of Style (16th Edition):

Ikram, Muhammad. “Analysis and design of secure and privacy preserving systems.” 2018. Doctoral Dissertation, University of New South Wales. Accessed November 26, 2020. http://handle.unsw.edu.au/1959.4/60197 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51296/SOURCE2?view=true.

MLA Handbook (7th Edition):

Ikram, Muhammad. “Analysis and design of secure and privacy preserving systems.” 2018. Web. 26 Nov 2020.

Vancouver:

Ikram M. Analysis and design of secure and privacy preserving systems. [Internet] [Doctoral dissertation]. University of New South Wales; 2018. [cited 2020 Nov 26]. Available from: http://handle.unsw.edu.au/1959.4/60197 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51296/SOURCE2?view=true.

Council of Science Editors:

Ikram M. Analysis and design of secure and privacy preserving systems. [Doctoral Dissertation]. University of New South Wales; 2018. Available from: http://handle.unsw.edu.au/1959.4/60197 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:51296/SOURCE2?view=true


University of Texas – Austin

28. -5021-9014. MDEA : malware detection with evolutionary adversarial learning.

Degree: MSin Computer Sciences, Computer Science, 2020, University of Texas – Austin

 Many applications have used machine learning as a tool to detect malware. These applications take in raw or processed binary data to feed neural network… (more)

Subjects/Keywords: Evolutionary algorithm; Malware detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-5021-9014. (2020). MDEA : malware detection with evolutionary adversarial learning. (Masters Thesis). University of Texas – Austin. Retrieved from http://dx.doi.org/10.26153/tsw/7424

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-5021-9014. “MDEA : malware detection with evolutionary adversarial learning.” 2020. Masters Thesis, University of Texas – Austin. Accessed November 26, 2020. http://dx.doi.org/10.26153/tsw/7424.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-5021-9014. “MDEA : malware detection with evolutionary adversarial learning.” 2020. Web. 26 Nov 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-5021-9014. MDEA : malware detection with evolutionary adversarial learning. [Internet] [Masters thesis]. University of Texas – Austin; 2020. [cited 2020 Nov 26]. Available from: http://dx.doi.org/10.26153/tsw/7424.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-5021-9014. MDEA : malware detection with evolutionary adversarial learning. [Masters Thesis]. University of Texas – Austin; 2020. Available from: http://dx.doi.org/10.26153/tsw/7424

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Wright State University

29. Severyn, Stacie Noel. Adapting Linguistic Deception Cues for Malware Detection.

Degree: MSCE, Computer Engineering, 2014, Wright State University

 People verbally express themselves in a variety of ways, yet the same patterns consistently appear within the words of a person who is being deceptive.… (more)

Subjects/Keywords: Computer Engineering; malware detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Severyn, S. N. (2014). Adapting Linguistic Deception Cues for Malware Detection. (Masters Thesis). Wright State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=wright1421025881

Chicago Manual of Style (16th Edition):

Severyn, Stacie Noel. “Adapting Linguistic Deception Cues for Malware Detection.” 2014. Masters Thesis, Wright State University. Accessed November 26, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=wright1421025881.

MLA Handbook (7th Edition):

Severyn, Stacie Noel. “Adapting Linguistic Deception Cues for Malware Detection.” 2014. Web. 26 Nov 2020.

Vancouver:

Severyn SN. Adapting Linguistic Deception Cues for Malware Detection. [Internet] [Masters thesis]. Wright State University; 2014. [cited 2020 Nov 26]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=wright1421025881.

Council of Science Editors:

Severyn SN. Adapting Linguistic Deception Cues for Malware Detection. [Masters Thesis]. Wright State University; 2014. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=wright1421025881


NSYSU

30. Wang, I-Kai. Multi-layer Incremental Clustering for Malware Analysis.

Degree: Master, Information Management, 2015, NSYSU

 The threat of malware is definitely the most important topic of internet security. As the growth of malware is faster ever and ever, the defense… (more)

Subjects/Keywords: incremental clustering; malware detection; static analysis; malware family

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, I. (2015). Multi-layer Incremental Clustering for Malware Analysis. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815115-154123

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, I-Kai. “Multi-layer Incremental Clustering for Malware Analysis.” 2015. Thesis, NSYSU. Accessed November 26, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815115-154123.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, I-Kai. “Multi-layer Incremental Clustering for Malware Analysis.” 2015. Web. 26 Nov 2020.

Vancouver:

Wang I. Multi-layer Incremental Clustering for Malware Analysis. [Internet] [Thesis]. NSYSU; 2015. [cited 2020 Nov 26]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815115-154123.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang I. Multi-layer Incremental Clustering for Malware Analysis. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815115-154123

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [15]

.