Search Results - "Shahzad, R. K."

  • Showing 1 - 3 results of 3
Refine Results
  1. 1

    Veto-based Malware Detection by Shahzad, R. K., Lavesson, N.

    “…Malicious software (malware) represents a threat to the security and privacy of computer users. Traditional signature-based and heuristic-based methods are…”
    Get full text
    Conference Proceeding
  2. 2

    Detecting scareware by mining variable length instruction sequences by Shahzad, R. K., Lavesson, N.

    Published in 2011 Information Security for South Africa (01-08-2011)
    “…Scareware is a recent type of malicious software that may pose financial and privacy-related threats to novice users. Traditional countermeasures, such as…”
    Get full text
    Conference Proceeding
  3. 3

    Accurate Adware Detection Using Opcode Sequence Extraction by Shahzad, R. K., Lavesson, N., Johnson, H.

    “…Adware represents a possible threat to the security and privacy of computer users. Traditional signature-based and heuristic-based methods have not been proven…”
    Get full text
    Conference Proceeding