Search Results
Suggested Topics within your search.
Suggested Topics within your search.
- Malware (Computer software)
- Computer security 114
- Security measures 67
- Computer networks 48
- Computer crimes 46
- Prevention 46
- Computer viruses 22
- Cyberterrorism 19
- Access control 13
- Government policy 12
- Debugging in computer science 11
- Evaluation 11
- Computers 9
- Extortion 9
- Cyberinfrastructure 7
- Data protection 7
- Investigation 7
- Law and legislation 7
- Pipelines 6
- Hacking 5
- Infrastructure (Economics) 5
- Internet 5
- Mobile computing 5
- Application software 4
- Machine learning 4
- National security 4
- Online social networks 4
- Software failures 4
- Web 2.0 4
- Artificial intelligence 3
-
1
-
2
-
3
-
4
Detection of intrusions and malware & vulnerability assessment third international conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006 : proceedings /
Published 2006Full Text (via Springer)
Electronic Conference Proceeding eBook -
5
-
6
-
7
-
8
-
9
Best practices for continuity of operations (handling destructive malware) /
Published 2018Online Access
Government Document eBook -
10
-
11
Android malware detection and adversarial methods
Published 2024Full Text (via Springer)
Electronic eBook -
12
-
13
-
14
Detection of intrusions and malware, and vulnerability assessment 8th international conference, DIMVA 2011, Amsterdam, the Netherlands, July 7-8, 2011 : proceedings /
Published 2011Full Text (via Springer)
Electronic Conference Proceeding eBook -
15
-
16
Ransomware : penetration testing and contingency planning /
Published 2024Full Text (via Taylor & Francis)
Electronic eBook -
17
-
18
-
19
-
20