1. The global cyber-vulnerability report. (2015) Authors: Subrahmanian, V. S; Ovelgonne, Michael; Dumitras, Tudor; Prakash, B. Aditya Record Type: Book Extent: 1 online resource, illustrations, maps View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Windows virus and malware troubleshooting. ([2017]) Authors: Bettany, Andrew; Halsey, Mike Record Type: Book Extent: 1 online resource (xvii, 95 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Advanced monitoring in P2P botnets : a dual perspective /: a dual perspective. ([2018]) Authors: Karuppayah, Shankar Record Type: Book Extent: 1 online resource (xvii, 105 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Android malware and analysis. ([2014]) Other Names: Dunham, Ken Record Type: Book Extent: 1 online resource (232 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Big data analytics with applications in insider threat detection. ([2018]) Authors: Thuraisingham, Bhavani M; Masud, Mehedy; Parveen, Pallabi; Khan, Latifur Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Cuckoo Malware Analysis. (2013) Other Names: Oktavianto, Digit Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Malware analysis techniques : tricks for the triage of adversarial software /: tricks for the triage of adversarial software. (2021) Authors: Barker, Dylan Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware /: a comprehensive approach to detect and analyze modern malware. ([2020]) Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Intelligent mobile malware detection. (2022) Authors: Thomas, Tony; John, Teenu; Alazab, Mamoun, 1980-; Surendran, Roopak Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Cybersecurity threats, malware trends, and strategies : discover risk mitigation strategies for modern threats in your organization /: discover risk mitigation strategies for modern threats in your organization. (2023) Authors: Rains, Tim Other Names: Youngblood CISSP, Timothy writer of supplementary textual content. Record Type: Book Extent: 1 online resource (380 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗