Mostrando 201 - 220 Resultados de 290 Para Buscar '"malware"', tiempo de consulta: 0.11s Limitar resultados
  1. 201
    “…Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-matching algorithms help human experts to scan system logs and network traffic for known virus or malware signatures. Recent research has introduced effective Machine Learning (ML) models for cyber-attack detection, promising to automate the task of detecting, tracking and blocking malware and intruders. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  2. 202
    “…To evaluate the effectiveness of the proposed framework, we experimented our architecture with 194 various samples of malware and 46 variants, with a duration of sixty minutes for each sample, and thoroughly examined the network traffic data for malicious behaviors. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  3. 203
    por Jahnel, Benedikt, König, Wolfgang
    Publicado 2020
    “…The text covers several of the most fundamental aspects of quality of service: connectivity, coverage, interference, random environments, and propagation of malware. It especially highlights two important limiting scenarios of large spatial systems: the high-density limit and the ergodic limit. …”
    Enlace del recurso
    Enlace del recurso
  4. 204
    por Bunino, Matteo
    Publicado 2023
    “…He did his thesis at Huawei's Munich Research Center (MRC), where he developed a prototype for analyzing dynamically evasive malware with the aid of reinforcement learning. Afterward, he continued working at Huawei's AI4Sec research team, at the intersection between cyber security and machine learning to develop intelligent methods for analysing malware.…”
    Enlace del recurso
  5. 205
    por Carvey, Harlan
    Publicado 2012
    “…The book covers live response, file analysis, malware detection, timeline, and much more. The author presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. …”
    Enlace del recurso
  6. 206
    “…We discuss at each stage whether the different strategies we analyse have been encountered already in existing malware, and the likelihood of them being implemented in the future. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  7. 207
    “…Our results, applied to 57 different anti-virus engines, show that we can mimic their behaviour with an accuracy close to 98% in the best case and 75% in the worst, applied on Windows’ disk resident malware.…”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  8. 208
    por Baek, Youngkyun, Ko, Ryan, Marsh, Tim
    Publicado 2014
    “…The topics that will be present in this book includes future of serious games and immersive technologies and their impact on society; online and mobile games; achievement systems in serious games; persuasive technology and games for saving and money management; malware analytics for social networking; serious games for mental health interventions; educational implications of social network games; learning and acquiring subject knowledge using serious games in classrooms. …”
    Enlace del recurso
    Enlace del recurso
  9. 209
    “…Fourteen papers range over topics including epidemic models, models for trust inference, coverage strategies for networks, vehicle flow propagation, bio-inspired routing algorithms, P2P botnet attacks and defences, fault propagation in gene-cellular networks, malware propagation for mobile networks, information propagation in crisis situations, financial contagion in interbank networks, and finally how to maximize the spread of influence in social networks. …”
    Enlace del recurso
    Enlace del recurso
  10. 210
    por Pelton, Joseph, Singh, Indu B
    Publicado 2015
    “…Covering both the most common personal attacks of identity fraud, phishing, malware, and breach of access as well as the larger threats against companies and governmental systems, the authors explain the vulnerabilities of the internet age. …”
    Enlace del recurso
    Enlace del recurso
  11. 211
    “…We introduce an integrated approach of security monitoring via Security by Isolation with Linux Containers and Deep Learning methods for the analysis of real time data in Grid jobs running inside virtualized High-Throughput Computing infrastructure in order to detect and prevent intrusions. A dataset for malware detection in Grid computing is described. …”
    Enlace del recurso
  12. 212
    por Zhu, Xuejin, Huang, Jie
    Publicado 2023
    “…Identifying influential spreaders in complex networks is critical for information spread and malware diffusion suppression. In this paper, we propose a novel influential spreader identification method, called SpreadRank, which considers the path reachability in information spreading and uses its quantitative index as a measure of node spread centrality to obtain the spread influence of a single node. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  13. 213
    por Han, Kyusunk, Shon, Taeshik
    Publicado 2014
    “…Such openness, however, can promote serious threats, including malware and illegal usage. In order to prevent such threats, several stores use online authentication techniques. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  14. 214
    “…Furthermore, the attack-defense game between malware and WRSNs is constructed and the optimal strategies of both players are obtained. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  15. 215
    por Hagen, Josiah
    Publicado 2015
    “…The presentation will include how-to’s on classifying malware, looking into encrypted tunnels, and finding botnets in DNS data.…”
    Enlace del recurso
  16. 216
    por Andersson, Jonathan
    Publicado 2015
    “…He has domain expertise in embedded systems, information security & real-time transaction processing systems, vulnerability & malware analysis, product development & manufacturing, credit card & check processing, optics & pattern recognition systems, image processing, USB storage & media card technology, solar technology, vehicle diagnostic technology, and varied mobile & wireless technologies including software defined radio …”
    Enlace del recurso
  17. 217
    por Alani, Mohammed M., Damiani, Ernesto
    Publicado 2023
    “…Attacks such as botnets and malware injection usually start with a phase of reconnaissance to gather information about the target IoT device before exploitation. …”
    Enlace del recurso
    Enlace del recurso
    Enlace del recurso
    Online Artículo Texto
  18. 218
  19. 219
  20. 220
Herramientas de búsqueda: RSS