An ontology of suspicious software behavior

Applied ontology 11 (1):29-49 (2016)
  Copy   BIBTEX

Abstract

Malicious programs have been the main actors in complex, sophisticated attacks against nations, governments, diplomatic agencies, private institutions and people. Knowledge about malicious program...

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 103,343

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Analysis and Identification of Malicious Applications.Mr Kamalakar - 2025 - International Journal of Engineering Innovations and Management Strategies 1 (10):1-12.
Free speech.David Weissman - 1996 - Metaphilosophy 27 (4):339-355.
Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
Ransomware Readiness Assessment Tool.Mannan Abdul - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (7):1-16.

Analytics

Added to PP
2016-06-30

Downloads
50 (#457,975)

6 months
14 (#181,413)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Antonio Marchi
University of Amsterdam

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references