温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.eb.com/technology/malware
点击访问原文链接

Malware | Computing Security & Prevention | Britannica

SUBSCRIBESUBSCRIBESUBSCRIBEHomeHistory & SocietyScience & TechBiographiesAnimals & NatureGeography & TravelArts & CultureProConMoneyGames & QuizzesVideosOn This DayOne Good FactDictionaryNew ArticlesHistory & SocietyLifestyles & Social IssuesPhilosophy & ReligionPolitics, Law & GovernmentWorld HistoryScience & TechHealth & MedicineScienceTechnologyBiographiesBrowse BiographiesAnimals & NatureBirds, Reptiles & Other VertebratesEnvironmentFossils & Geologic TimeInsects & Other InvertebratesMammalsPlantsGeography & TravelGeography & TravelArts & CultureEntertainment & Pop CultureLiteratureSports & RecreationVisual ArtsImage GalleriesPodcastsSummariesTop QuestionsLists and StoriesBritannica KidsAsk the ChatbotGames & QuizzesHistory & SocietyScience & TechBiographiesAnimals & NatureGeography & TravelArts & CultureProConMoneyVideosmalwareIntroductionReferences & Edit HistoryQuick Facts & Related TopicsComputers and Technology QuizPolitics, Law & GovernmentLaw, Crime & PunishmentFacebookXhttps://www.britannica.com/technology/malwareInternational Journal of Engineering Research and Technology - Malware and Malware Detection Techniques: A Survey (PDF)Cell Press - Heliyon - Analyzing and comparing the effectiveness of malware detection: A study of machine learning approachesUniversity of Guelph - What is Malware? (PDF)UWL Repository - On Partitional Clustering of Malware (PDF)Lifewire - A brief history of MalwareEngineering LibreTexts - Malware and Security AttacksInternational Journal of Scientific and Engineering Research - Types of Malware and its AnalysisIBM - What is malware?William L. Hosch William L. Hosch was an editor at Encyclopædia Britannica.Britannica Editors Encyclopaedia Britannica's editors oversee subject areas in which they have extensive knowledge, whether from years of experience gained by working on that content or via study for an advanced degree....Historymaliciouscomputer programtrojansspywarewormspersonal computere-mailWeb siteshardwarespywareransomwaresmartphoneszombie computersspamdenial of service attackspornographysoftwareRootkitscurbSony Corporationrootkitpublic relationsBritannica Quiz Computers and Technology QuizStuxnetWindowsoperating systemSiemens AGsupervisory control and data acquisitioninfrastructurenuclear powerLeonard M. Adlemanransomwarelist of notable computer viruses and malwarespywarecomputer wormzero-day malwareSee all related contentmobile phonesPegasushuman rightslawmoney launderersmurderFacebookUnited StatesFraudAppleJoseph BidentechnologyWilliam L. Hosch

智能索引记录