A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction
Codes (symbols); Internet of things; Comprehensive assessment; Detection models; Information and Communication Technologies; Information sharing; Internet of thing (IOT); IOT applications; Resourceconstrained devices; Security breaches; Malware
Saved in:
Main Authors: | Chimeleze C.U., Jamil N., Ismail R., Lam K.-Y. |
---|---|
Other Authors: | 57222127806 |
Format: | Conference Paper |
Published: |
Springer Science and Business Media Deutschland GmbH
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Malware behavior image for malware variant identification
by: Mohd. Shaid, Syed Zainudeen, et al.
Published: (2015) -
A systematic literature review on the limitations and future directions of the existing requirement prioritization techniques
by: Seyed Fadzir, Syarifah Fazlin, et al.
Published: (2016) -
Incorporating known malware signatures to classify new malware variants in network traffic
by: Ismail, Ismahani, et al.
Published: (2015) -
Malware detection issues, challenges, and future directions: A survey
by: Aboaoja, Faitouri A., et al.
Published: (2022) -
Malware threat analysis techniques and approaches for iot applications: A review
by: Uchenna C.C., et al.
Published: (2023)