Basic Search / Search Result

  • Search Result: 7results Search Strategy: "Department of Computer Science and Information Engineering".edept (Phrase) and ekeyword.raw="Malware"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Characterizing Malware Detectors via Black-Box Adversarial Attacks

    2

    On Modeling Hybrid IoT Malware Propagation Considering Size Distributions
    • Department of Computer Science and Information Engineering /106/ Master
    • Author: Jiong-Lun Li Advisor: Shin-Ming Cheng
    • With the increasing use of Interent of Things (IoT) in current network, more and more malware can l…
    • Clicks: 170Downloads: 0
    • Full text public date 2023/08/09 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    3

    Code Obfuscator Classification System Based on Static Analysis

    4

    Malware Detection System Based on Shell Analysis

    5

    Packed-Malware Detection System Based on Dynamic Analysis
    • Department of Computer Science and Information Engineering /102/ Master
    • Author: Ting-han Lin Advisor: Shi-Jinn Horng
    • "Packers", a software compression and encryption technique, is commonly used in Software Engineerin…
    • Clicks: 189Downloads: 0
    • Full text public date 2019/08/28 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    6

    Malware Detection System Based on Static Analysis and Data Mining Methods
    • Department of Computer Science and Information Engineering /94/ Master
    • Author: Kun-hsien Hsiao Advisor: Shi-Jinn Horng
    • So far, most of AntiVirus software in the marketing is base on signature to defend the damage by Ma…
    • Clicks: 317Downloads: 0
    • Full text public date 2011/08/04 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    7

    Backdoor Attack against Structure-based Malware Detector Using Partition
    1