Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,232,832 papers from all fields of science
Search
Sign In
Create Free Account
VirusTotal
Known as:
Virus total
, VirusTotal.com
VirusTotal is a website, created by the Spanish security company Hispasec Sistemas. Launched in June 2004, it was acquired by Google Inc. in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Amonetize
Android
Antivirus software
Avast Antivirus
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Identification of Mobile Malicious Application using KAYO Technique
D. Madhuri
,
K. Babu
2019
Corpus ID: 86397028
Versatile explicit website pages contrast fundamentally from their work area partners in substance, format and usefulness. As…
Expand
2018
2018
Malware static analysis and DDoS capabilities detection
Mounir Baammi
arXiv.org
2018
Corpus ID: 54435551
The present thesis addresses the topic of denial of service capabilities detection at malware binary level, with the aim of…
Expand
2018
2018
A STATISTICAL APPROACH FOR PACKER IDENTIFICATION
Nguyen Minh Hai
2018
Corpus ID: 56262010
Most of modern malware are packed by packers which automatically generate a lot of obfuscation techniques to defeat the anti…
Expand
2018
2018
Malware Analysis on Android Apps: A Permission-Based Approach
A. O. Gamao
Social Science and Humanities Journal
2018
Corpus ID: 56809114
-The use of Android devices nowadays is almost inevitable. Having been able to get a big slice of the mobile operating systems…
Expand
2017
2017
A network attack forensic platform against HTTP evasive behavior
Z. Li
,
Haiqing Pan
,
Wenhao Liu
,
Fei Xu
,
Zigang Cao
,
G. Xiong
Journal of Supercomputing
2017
Corpus ID: 23649357
With the increasing amounts of data streams and sophistication of attacks, there is a need for network forensic systems that…
Expand
2016
2016
Detecting Botnets using a Collaborative Situational-aware IDPS
M. Mathews
,
A. Joshi
,
Timothy W. Finin
International Conference on Information Systems…
2016
Corpus ID: 15171234
Botnet attacks turn susceptible victim computers into bots that perform various malicious activities while under the control of a…
Expand
2016
2016
Classifying Windows Malware with Static Analysis
Maryann Gong
,
Uma M. Girkar
,
Benjamin Xie
2016
Corpus ID: 8540310
Adversaries are creating new types of malicious software, or malware, at an increasing rate. The amount and diversity of malware…
Expand
2015
2015
Taming the Android AppStore: Lightweight Characterization of Android Applications
Luigi Vigneri
,
J. Chandrashekar
,
Ioannis Pefkianakis
,
Olivier Heen
arXiv.org
2015
Corpus ID: 16762970
There are over 1.2 million applications on the Google Play store today with a large number of competing applications for any…
Expand
2010
2010
Research and Development Projects Launched in Response to the Dynamic Evolution of Internet Security Threats - A Perspective of a CERT Team
P. Kijewski
,
M. Maj
,
Krysztof Silicki
2010
Corpus ID: 108257532
Abstract : Wherever they are, CERTs (Computer Emergency Response Teams) as security incident handlers have hands-on experience…
Expand
2007
2007
Virus Total, analiza archivos sospechosos de estar infectados con virus
J. Penalva
2007
Corpus ID: 145963002
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE