Analysis of known and unknown malware bypassing techniques
Nowadays, malware attacks are the most expensive damages for organizations in different types of computer and network systems. While different types of attacks are well surveyed and documented, little details related to bypass malware detections and defenses are provided in the public domains. Malw...
Main Authors: | Daryabar, Farid, Dehghantanha, Ali, Udzir, Nur Izura, Mohd Sani, Nor Fazlida, Shamsuddin, Solahuddin, Norouzizadeh, Farhood |
---|---|
Format: | Article |
Language: | English |
Published: |
Advanced Institute of Convergence Information Technology
2013
|
Online Access: | http://psasir.upm.edu.my/id/eprint/30589/1/Analysis%20of%20known%20and%20unknown%20malware%20bypassing%20techniques.pdf |
Similar Items
-
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011) -
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013) -
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013) -
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012) -
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)