Search Results - "adware"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Detecting malware attack in mobile phone using Intrusion Detection and Prevention System (IDPS) by Leow, Yu Hong

    Published 2024
    “…In the signature-based method, adware is identified by comparing it with a database of known adware signatures. …”
    Get full text
    Get full text
  2. 2

    The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Mohd Zamri, Osman, Alanda, Alde, Erianda, Aldo, Shahreen, Kasim, Mohd Faizal, Ab Razak

    Published 2024
    “…Its main categories include viruses, worms, Trojan horses, spyware, adware, and ransomware. Hence, many deep learning researchers apply deep learning in their malware studies. …”
    Get full text
    Get full text
  3. 3

    The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution by Che Akmal, Che Yahaya, Ahmad, Firdaus, Ernawan, Ferda, Wan Isni Sofiah, Wan Din

    Published 2022
    “…The types of malwares are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, root exploit is one of the most destructive malware types since it disguises and obscures all types of malwares and provides a mechanism for other malware to carry out malicious acts invisibly. …”
    Get full text
    Get full text
  4. 4

    Virus in the computer and smartphone system / Mohammad Faiz Hafizuddin Johari by Johari, Mohammad Faiz Hafizuddin

    Published 2015
    “…Malware includes computer virus, worms, Trojan horses, ransom-ware, spyware, adware, scare-ware, and other malicious programs. …”
    Get full text