User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 ASOS INDEKS
  Citation Number 4
 Views 4
YAYGIN GÖRÜLEN DOSYA ENJEKSİYON ZARARLILARININ ANALİZİ VE SİSTEMATİK OLARAK TESPİTİ
2018
Journal:  
Niğde Ömer Halisdemir Üniversitesi Mühendislik Bilimleri Dergisi
Author:  
Abstract:

Malware is used as a software that aims to break the processing of operating system, doing data theft, making the folders useless, reaching the private computer system and showing the unwanted advertisement. Above 250,000 new malware is recorded everyday by the Institute of AV-TEST from a different region of the world. File injection malware is considered one of the harmful malware in the world. File injection malware is defined as a malware that is used to abuse the users by injecting a virus into the executable or already executed folders on the operating system. The effects of this kind of malware can be stated as putting a password to the folders in the victim computer, installing harmful server connection, spreading the effect on running folders to slow down the operating system, effecting removable drives, causing physical damage using computer hardware. In this case, 10 different types of file injection malwares which are widely seen and important in the world determined. The structural and behavioural analysis of the file injection malware was then carried out in virtual laboratories established on Windows and Linux operating systems. A new algorithm is proposed to detect the file injection malwares by capturing the common behavioural properties. Through this algorithm, it is possible to determine whether the input file is harmful by performing static and dynamic analysis.

Keywords:

Citation Owners
Attention!
To view citations of publications, you must access Sobiad from a Member University Network. You can contact the Library and Documentation Department for our institution to become a member of Sobiad.
Off-Campus Access
If you are affiliated with a Sobiad Subscriber organization, you can use Login Panel for external access. You can easily sign up and log in with your corporate e-mail address.
Similar Articles








Niğde Ömer Halisdemir Üniversitesi Mühendislik Bilimleri Dergisi

Field :   Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 723
Cite : 779
2023 Impact : 0.135
Niğde Ömer Halisdemir Üniversitesi Mühendislik Bilimleri Dergisi