[PDF][PDF] A Study on Cyber security: Analyzing Current Threats, Navigating Complexities, and Implementing Prevention Strategies
In the intricate landscape of modern cyber threats, encompassing everything from
sophisticated malware to targeted phishing tactics, this scholarly discussion emerges as a …
sophisticated malware to targeted phishing tactics, this scholarly discussion emerges as a …
Classification of Malware Images Using Fine-Tunned ViT
Malware detection and classification have become critical tasks in ensuring the security and
integrity of computer systems and networks. Traditional methods of malware analysis often …
integrity of computer systems and networks. Traditional methods of malware analysis often …
[PDF][PDF] A survey of network attack detection research
A Aboras¹, MK Hadi - 2021 - academia.edu
With the popularization of the Internet, resources shared on the Internet have become the
main targets of hackers'. In view of the rapid increase in network attacks and their adverse …
main targets of hackers'. In view of the rapid increase in network attacks and their adverse …
Review of Encrypted Virus: Detection analyses Methods
Most of the recent researchers had a great interest in encrypted virus detection. This interest
came after the continuous production of encrypted viruses. The machine learning algorithms …
came after the continuous production of encrypted viruses. The machine learning algorithms …
Implementation of a Virus with Treatment and Protection Methods
RR Asaad - ICONTECH INTERNATIONAL JOURNAL, 2020 - icontechjournal.com
Currently, viruses are the most dangerous things that happens to computers, whether by
transferring data or from the Internet cloud. This research paper shows how to implement a …
transferring data or from the Internet cloud. This research paper shows how to implement a …
Pregled metoda i alata zaštite osobnih računala od kibernetičkih prijetnji
L Paun - 2021 - repozitorij.fpz.unizg.hr
Sažetak Ovaj završni rad prikazuje metode i alate za zaštitu osobnih računala od
kibernetičkih prijetnji. Također su opisane različite metode i programska rješenja koja se …
kibernetičkih prijetnji. Također su opisane različite metode i programska rješenja koja se …
[CITATION][C] Optimising Behavioural Oriented Concurrency for Parallelism
R Ward, M Kogias, L Vilanova - 2023