X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (15275) 15275
Conference Proceeding (5370) 5370
Journal Article (4664) 4664
Web Resource (2799) 2799
Trade Publication Article (1762) 1762
Magazine Article (828) 828
Publication (398) 398
Book Chapter (327) 327
Book / eBook (115) 115
Dissertation (107) 107
Reference (70) 70
Report (61) 61
Book Review (29) 29
Government Document (23) 23
Transcript (10) 10
Paper (3) 3
Streaming Video (2) 2
Journal / eJournal (1) 1
Technical Report (1) 1
Video Recording (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
malware (29015) 29015
internet crime (4513) 4513
software (4341) 4341
computer security (4271) 4271
computer viruses (2935) 2935
internet (2293) 2293
network security (2173) 2173
social networks (1865) 1865
data integrity (1545) 1545
security (1513) 1513
computers (1462) 1462
threats (1365) 1365
researchers (1352) 1352
security management (1255) 1255
security services (1198) 1198
hackers (1149) 1149
machine learning (1146) 1146
privacy (1089) 1089
spyware (1076) 1076
earnings per share (1024) 1024
smartphones (995) 995
malware detection (966) 966
automation (963) 963
artificial intelligence (934) 934
feature extraction (921) 921
fraud (914) 914
national security (912) 912
servers (900) 900
digital currencies (881) 881
web sites (858) 858
operating systems (853) 853
data encryption (832) 832
computer science, information systems (827) 827
electronic mail systems (823) 823
criminal investigations (814) 814
employees (773) 773
internet of things (773) 773
computer information security (698) 698
computer science (693) 693
customer services (674) 674
android (658) 658
infrastructure (638) 638
trademarks (634) 634
virtual networks (593) 593
corporate profits (592) 592
information technology (590) 590
trends (588) 588
cloud computing (578) 578
inventors (575) 575
stock exchanges (566) 566
classification (565) 565
algorithms (557) 557
monitoring (554) 554
patents (551) 551
espionage (550) 550
cyberterrorism (545) 545
androids (531) 531
smart phones (526) 526
humanoid robots (508) 508
anti-virus software (507) 507
law enforcement (505) 505
analysis (501) 501
research (497) 497
institutional investments (478) 478
customers (474) 474
data security (467) 467
networks (462) 462
personal information (460) 460
consumers (450) 450
wireless networks (444) 444
methods (443) 443
data mining (430) 430
engineering, electrical & electronic (428) 428
telecommunications (426) 426
present value (414) 414
safety and security measures (400) 400
stockholders (398) 398
conferences (397) 397
software upgrading (395) 395
computer networks (391) 391
collaboration (384) 384
access control (376) 376
prevention (375) 375
computer science, software engineering (370) 370
identity theft (367) 367
malware analysis (366) 366
private networks (365) 365
phishing (361) 361
static analysis (360) 360
compliance (358) 358
mobile communication (345) 345
personal computers (338) 338
profit margins (338) 338
surveillance (338) 338
investments (337) 337
computer programs (336) 336
training (336) 336
computer crime (335) 335
capital losses (326) 326
ip networks (311) 311
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (67) 67
UofT at Mississauga - Stacks (12) 12
Engineering & Comp. Sci. - Stacks (10) 10
Robarts - Stacks (8) 8
Collection Dvlpm't (Acquisitions) - Vendor file (2) 2
Law (Bora Laskin) - Stacks (2) 2
UTL at Downsview - May be requested (2) 2
UofT at Scarborough - Stacks (2) 2
Criminology - Stacks (1) 1
Media Commons - Audio Visual (1) 1
Robarts - Searching (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (29645) 29645
Chinese (231) 231
Spanish (152) 152
Japanese (148) 148
German (63) 63
Korean (37) 37
French (33) 33
Portuguese (21) 21
Turkish (11) 11
Dutch (6) 6
Indonesian (5) 5
Urdu (4) 4
Czech (3) 3
Hindi (3) 3
Lithuanian (3) 3
Russian (3) 3
Arabic (1) 1
Croatian (1) 1
Persian (1) 1
Polish (1) 1
Swedish (1) 1
Ukrainian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Computer, ISSN 0018-9162, 01/2019, Volume 52, Issue 6
Journal Article
Jisuanji Xitong Yingyong = Computer Systems and Applications, ISSN 1003-3254, 01/2018, Issue 12
Anti-virtualization is currently an important factor affecting the overall acquisition of sample behaviour data by a dynamic analysis system of malicious code.... 
Malware
Journal Article
3C Tecnologia, 01/2017, Volume 6, Issue 4, p. 24
EL SELLADO DE TIEMPO CONFIABLE SE EMPLEA PARA CERTIFICAR QUE UN DOCUMENTO INFORMaTICO SE ENCUENTRE iNTEGRO DESDE LA FECHA EN QUE SE REGISTRo, SIN EMBARGO, EL... 
Malware
Journal Article
Computers & Security, ISSN 0167-4048, 08/2018, Volume 77, pp. 756 - 772
Banking malware are a class of information stealing malicious software that target the financial industry. Banking malware families have become persistent with... 
Malware components | Banking malware | Malware similarity | Malware analysis | Malware capabilities | COMPUTER SCIENCE, INFORMATION SYSTEMS | Surveys | Usage | Applications programming | Banks (Finance) | Spyware
Journal Article
Proceedings of the 2012 ACM conference on computer and communications security, ISSN 1543-7221, 10/2012, pp. 821 - 832
We investigate the emergence of the exploit-as-a-service model for driveby browser compromise. In this regime, attackers pay for an exploit kit or service to... 
malware | Security | Malware
Conference Proceeding
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2019, Volume 768, pp. 207 - 216
Conference Proceeding
Journal of Network and Computer Applications, ISSN 1084-8045, 11/2016, Volume 75, pp. 58 - 76
Malicious software (malware) is a computer program designed to create harmful and undesirable effects. It considered as one of the many dangerous threats for... 
Malware | Mobile malware | Bibliometric analysis | Malware analysis | Intrusion detection system
Journal Article
Nauchno-Tekhnicheskii Vestnik Informatsionnykh Tekhnologii, Mekhaniki i Optiki, ISSN 2226-1494, 03/2012, Volume 12, Issue 2
The main problems of traditional methods of malicious software detection, based on the virus databases updatingare analyzed. Alternative methods based on cloud... 
Malware
Journal Article
IEEE Communications Surveys & Tutorials, ISSN 1553-877X, 2015, Volume 17, Issue 2, pp. 998 - 1022
Smartphones have become pervasive due to the availability of office applications, Internet, games, vehicle guidance using location-based services apart from... 
Google | Android Malware | Obfuscation | Humanoid robots | Tutorials | Malware | Dynamic Analysis | Behavioral Analysis | Androids | Static Analysis | Smart phones | Stealth Malwar | SYSTEM | stealth malware | static analysis | COMPUTER SCIENCE, INFORMATION SYSTEMS | Android malware | behavioral analysis | dynamic analysis | TELECOMMUNICATIONS | obfuscation
Journal Article
10. Bugs
2009, Oxford poets, ISBN 1903039959, 63
Book
2016, 1, Routledge research in international law, ISBN 9781138245228, 111 pages
Book
PLoS ONE, ISSN 1932-6203, 10/2019, Volume 14, Issue 10, p. e0223679
[This corrects the article DOI: 10.1371/journal.pone.0211373.]. 
Homology | Malware
Journal Article
2010, 1, Syngress seven deadliest attacks series, ISBN 9781597495455, xxi, 133
Seven Deadliest Social Network Attacks provides a comprehensive view into how social networking attacks have impacted the livelihood and lives of adults and... 
Prevention | Web 2.0 | Malware (Computer software) | Computer networks | Computer security | Computer crimes | Security measures | Online social networks | Security
Book
Scalable Computing, ISSN 1895-1767, 2017, Volume 18, Issue 3, pp. 195 - 205
Journal Article
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2013, Volume 189, pp. 289 - 298
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 11170, pp. 405 - 431
Journal Article
Expert Systems With Applications, ISSN 0957-4174, 04/2020, Volume 143, p. 113022
Malware families typically evolve over a period of time. Differences between malware samples within a single family can originate from various code... 
Feature analysis, malware evolution | Malware | Support vector machine
Journal Article
EPJ Web of Conferences, ISSN 2101-6275, 06/2018, Volume 184, p. 02002
The 10B(p,α0)7Be reaction has been studied by applying the Trojan Horse method to the 2H(10B,α0 7Be)n reaction. The bare-nucleus astrophysical S(E)-factor in... 
Malware
Conference Proceeding
Proceedings of the 2012 ACM conference on computer and communications security, ISSN 1543-7221, 10/2012, pp. 241 - 252
One of Android's main defense mechanisms against malicious apps is a risk communication mechanism which, before a user installs an app, warns the user about... 
mobile | risk | malware | data mining | Risk | Malware | Data mining | Mobile
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.