Sizing up the malware threat - key malware trends for 2010

被引:0
|
作者
Cluley G.
机构
关键词
D O I
10.1016/S1353-4858(10)70045-3
中图分类号
学科分类号
摘要
Malware has changed over the past decade, evolving from being a bedroom operation run by solitary teenage boys to become a major money-making industry in its own right. © 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:8 / 10
页数:2
相关论文
共 50 条
  • [31] Personal privacy, information assurance, and the threat posed by malware technology
    Stytz, Martin R.
    Banks, Sheila B.
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
  • [32] IoT Malware Threat Hunting Method Based on Improved Transformer
    Li, Yaping
    Li, Yuancheng
    International Journal of Network Security, 2023, 25 (02) : 267 - 276
  • [33] A Survey on Cross-Architectural IoT Malware Threat Hunting
    Raju, Anandharaju Durai
    Abualhaol, Ibrahim Y.
    Giagone, Ronnie Salvador
    Zhou, Yang
    Huang, Shengqiang
    IEEE ACCESS, 2021, 9 : 91686 - 91709
  • [34] A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
    Hwang, Song-Yi
    Kim, Jeong-Nyeo
    SENSORS, 2021, 21 (21)
  • [35] Malware Triage for Early Identification of Advanced Persistent Threat Activities
    Laurenza, Giuseppe
    Lazzeretti, Riccardo
    Mazzotti, Luca
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2020, 1 (03):
  • [36] Leopard: Understanding the Threat of Blockchain Domain Name Based Malware
    Huang, Zhangrong
    Huang, Ji
    Zang, Tianning
    PASSIVE AND ACTIVE MEASUREMENT, PAM 2020, 2020, 12048 : 55 - 70
  • [37] Scalable malware classification with multifaceted content features and threat intelligence
    Hu, X.
    Jang, J.
    Wang, T.
    Ashraf, Z.
    Stoecklin, M. Ph.
    Kirat, D.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2016, 60 (04)
  • [38] Feature Reduction to Speed Up Malware Classification
    Moonsamy, Veelasha
    Tian, Ronghua
    Batten, Lynn
    INFORMATION SECURITY TECHNOLOGY FOR APPLICATIONS, 2012, 7161 : 176 - 188
  • [39] Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior
    Piplai, Aritran
    Mittal, Sudip
    Abdelsalam, Mahmoud
    Gupta, Maanak
    Joshi, Anupam
    Finin, Tim
    2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 47 - 52
  • [40] Cuckoo's Malware Threat Scoring and Classification: Friend or Foe?
    Walker, Aaron
    Amjad, Muhammad Faisal
    Sengupta, Shamik
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 678 - 684