Search Results

There are 4137 results for: content related to: SMM rootkit: a new breed of OS independent malware

  1. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Article first published online : 28 JAN 2015, DOI: 10.1002/sec.1186

  2. Using HTML5 to prevent detection of drive-by-download web malware

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1237–1255, Alfredo De Santis, Giancarlo De Maio and Umberto Ferraro Petrillo

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1077

  3. DLLMiner: structural mining for malware detection

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3311–3322, Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto, Hassan Takabi and Ashkan Sami

    Article first published online : 22 APR 2015, DOI: 10.1002/sec.1255

  4. DroidScreening: a practical framework for real-world Android malware analysis

    Security and Communication Networks

    Junfeng Yu, Qingfeng Huang and CheeHoo Yian

    Article first published online : 10 FEB 2016, DOI: 10.1002/sec.1430

  5. A static heuristic approach to detecting malware targets

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3015–3027, Mohaddeseh Zakeri, Fatemeh Faraji Daneshgar and Maghsoud Abbaspour

    Article first published online : 8 APR 2015, DOI: 10.1002/sec.1228

  6. Smart malware detection on Android

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4254–4272, Laura Gheorghe, Bogdan Marin, Gary Gibson, Lucian Mogosanu, Razvan Deaconescu, Valentin-Gabriel Voiculescu and Mihai Carabas

    Article first published online : 1 SEP 2015, DOI: 10.1002/sec.1340

  7. Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 626–640, Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu and Yuan-Cheng Lai

    Article first published online : 21 MAR 2013, DOI: 10.1002/sec.764

  8. A static Android malicious code detection method based on multi-source fusion

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3238–3246, Yao Du, Xiaoqing Wang and Junfeng Wang

    Article first published online : 30 MAR 2015, DOI: 10.1002/sec.1248

  9. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)

    Security and Communication Networks

    Volume 9, Issue 5, 25 March 2016, Pages: 389–419, Peter Teufl, Michaela Ferk, Andreas Fitzek, Daniel Hein, Stefan Kraxberger and Clemens Orthacker

    Article first published online : 18 JAN 2013, DOI: 10.1002/sec.675

  10. An effective behavior-based Android malware detection system

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2079–2089, Shihong Zou, Jing Zhang and Xiaodong Lin

    Article first published online : 21 NOV 2014, DOI: 10.1002/sec.1155

  11. Enhancing malware detection for Android systems using a system call filtering and abstraction process

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1179–1192, Abdelfattah Amamra, Jean-Marc Robert and Chamseddine Talhi

    Article first published online : 21 JUL 2014, DOI: 10.1002/sec.1073

  12. Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2813–2825, Zahid Anwar and Waqas Ahmad Khan

    Article first published online : 9 FEB 2015, DOI: 10.1002/sec.1205

  13. AutoMal: automatic clustering and signature generation for malwares based on the network flow

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1845–1854, Sun Hao, Wen Wang, Huabiao Lu and Peige Ren

    Article first published online : 29 MAY 2014, DOI: 10.1002/sec.1029

  14. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Article first published online : 13 JUL 2011, DOI: 10.1002/sec.331

  15. JSOD: JavaScript obfuscation detector

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1092–1107, Ismail Adel AL-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Cheng-Seen Ho and Shyi-Ming Chen

    Article first published online : 1 JUL 2014, DOI: 10.1002/sec.1064

  16. BotCatch: leveraging signature and behavior for bot detection

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 952–969, Yuede Ji, Qiang Li, Yukun He and Dong Guo

    Article first published online : 3 JUL 2014, DOI: 10.1002/sec.1052

  17. Three-phase behavior-based detection and classification of known and unknown malware

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2004–2015, Ying-Dar Lin, Yuan-Cheng Lai, Chun-Nan Lu, Peng-Kai Hsu and Chia-Yin Lee

    Article first published online : 8 JAN 2015, DOI: 10.1002/sec.1148

  18. A dynamic malware analyzer against virtual machine aware malicious software

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2245–2257, Abdurrahman Pektaş and Tankut Acarman

    Article first published online : 29 NOV 2013, DOI: 10.1002/sec.931

  19. Frequent sub-graph mining for intelligent malware detection

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1872–1886, Mojtaba Eskandari and Hooman Raesi

    Article first published online : 10 JAN 2014, DOI: 10.1002/sec.902

  20. TSSDroid: realization of an efficient and usable TSS API for the Android software stack

    Security and Communication Networks

    Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa and Toqeer Ali Syed

    Article first published online : 11 FEB 2016, DOI: 10.1002/sec.1448