Buscar
Mostrando ítems 1-10 de 125
A malware detection system inspired on the human immune system
(2012-07-23)
Malicious programs (malware) can cause severe damage on computer systems and data. The mechanism that the human immune system uses to detect and protect from organisms that threaten the human body is efficient and can be ...
A malware detection system inspired on the human immune system
(2012-07-23)
Malicious programs (malware) can cause severe damage on computer systems and data. The mechanism that the human immune system uses to detect and protect from organisms that threaten the human body is efficient and can be ...
Detecting malicious behavior in social platforms via hybrid knowledge and data driven systems
(Elsevier Science, 2021-12)
Among the wide variety of malicious behavior commonly observed in modern social platforms, one of the most notorious is the diffusion of fake news, given its potential to influence the opinions of millions of people who ...
Deep Learning na segurança computacional: detecção inteligente de códigos maliciosos
(Universidade Tecnológica Federal do ParanáPato BrancoBrasilDepartamento Acadêmico de InformáticaEngenharia de ComputaçãoUTFPR, 2018-12-12)
The increase in the amount of malware and their families amplified the problems of automatic detection and classification of their new variants. As computer security threats evolve, so does the need for effective defense ...
Análisis sobre la motivación expresada por el juzgador para declarar las denuncias o acusación particular de maliciosas o temerarias en las sentencias absolutorias
(Universidad de Guayaquil, Facultad de Jurisprudencia Ciencias Sociales y Políticas, 2020-10-23)
Este trabajo de investigación tiene como tema “ANALISIS SOBRE LA MOTIVACION
EXPRESADA POR EL JUZGADOR PARA DECLARAR LAS DENUNCIAS O ACUSACION
PARTICULAR DE MALICIOSAS O TEMERARIAS EN LAS SENTENCIAS
ABSOLUTORIAS” ...
Obfuscation procedure based on the insertion of the dead code in the crypter by binary search
(IEEE, 2018)
What threatens the cyberspace is known as malware, which in order to infect the technological devices, it has to be capable of bypassing the antivirus motor. To avoid the antivirus detection, the malicious code requires ...
Toward A Taxonomy Of Malware Behaviors
(OXFORD UNIV PRESSOXFORD, 2015)