Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Malware

Known as: Stealthware, Malicious exploit, Badware 
Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
This survey paper describes a literature review of deep learning (DL) methods for cyber security applications. A short tutorial… Expand
  • figure 2
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2019
Review
2019
Abstract The comprehensive integration of instrumentation, communication, and control into physical systems has led to the study… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2019
Review
2019
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn cyberattack exposed the critical fault… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2019
Review
2019
Authentication is an essential cryptographic primitive that confirms the identity of parties during communications. For security… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2019
Review
2019
Threats that have been primarily targeting nation states and their associated entities have expanded the target zone to include… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2019
Review
2019
Many online applications, such as online social networks or knowledge bases, are often attacked by malicious users who commit… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Review
2018
Review
2018
Malicious domains are one of the major resources required for adversaries to run attacks over the Internet. Due to the important… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Review
2018
Review
2018
Machine learning is adopted in a wide range of domains where it shows its superiority over traditional rule-based algorithms… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Review
2018
Review
2018
In the so called 'post-truth' era, characterized by a loss of public trust in various institutions, and the rise of 'fake news… Expand
  • figure 1
Review
2018
Review
2018
The Internet of things (IoT), which integrates a variety of devices into networks to provide advanced and intelligent services… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4