-
201“…Traditionally, cyber-attack detection relies on reactive, assistive techniques, where pattern-matching algorithms help human experts to scan system logs and network traffic for known virus or malware signatures. Recent research has introduced effective Machine Learning (ML) models for cyber-attack detection, promising to automate the task of detecting, tracking and blocking malware and intruders. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
202“…To evaluate the effectiveness of the proposed framework, we experimented our architecture with 194 various samples of malware and 46 variants, with a duration of sixty minutes for each sample, and thoroughly examined the network traffic data for malicious behaviors. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
203“…The text covers several of the most fundamental aspects of quality of service: connectivity, coverage, interference, random environments, and propagation of malware. It especially highlights two important limiting scenarios of large spatial systems: the high-density limit and the ergodic limit. …”
Enlace del recurso
Enlace del recurso
-
204por Bunino, Matteo“…He did his thesis at Huawei's Munich Research Center (MRC), where he developed a prototype for analyzing dynamically evasive malware with the aid of reinforcement learning. Afterward, he continued working at Huawei's AI4Sec research team, at the intersection between cyber security and machine learning to develop intelligent methods for analysing malware.…”
Publicado 2023
Enlace del recurso
-
205por Carvey, Harlan“…The book covers live response, file analysis, malware detection, timeline, and much more. The author presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. …”
Publicado 2012
Enlace del recurso
-
206“…We discuss at each stage whether the different strategies we analyse have been encountered already in existing malware, and the likelihood of them being implemented in the future. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
207“…Our results, applied to 57 different anti-virus engines, show that we can mimic their behaviour with an accuracy close to 98% in the best case and 75% in the worst, applied on Windows’ disk resident malware.…”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
208“…The topics that will be present in this book includes future of serious games and immersive technologies and their impact on society; online and mobile games; achievement systems in serious games; persuasive technology and games for saving and money management; malware analytics for social networking; serious games for mental health interventions; educational implications of social network games; learning and acquiring subject knowledge using serious games in classrooms. …”
Enlace del recurso
Enlace del recurso
-
209“…Fourteen papers range over topics including epidemic models, models for trust inference, coverage strategies for networks, vehicle flow propagation, bio-inspired routing algorithms, P2P botnet attacks and defences, fault propagation in gene-cellular networks, malware propagation for mobile networks, information propagation in crisis situations, financial contagion in interbank networks, and finally how to maximize the spread of influence in social networks. …”
Enlace del recurso
Enlace del recurso
-
210“…Covering both the most common personal attacks of identity fraud, phishing, malware, and breach of access as well as the larger threats against companies and governmental systems, the authors explain the vulnerabilities of the internet age. …”
Enlace del recurso
Enlace del recurso
-
211“…We introduce an integrated approach of security monitoring via Security by Isolation with Linux Containers and Deep Learning methods for the analysis of real time data in Grid jobs running inside virtualized High-Throughput Computing infrastructure in order to detect and prevent intrusions. A dataset for malware detection in Grid computing is described. …”
Enlace del recurso
-
212“…Identifying influential spreaders in complex networks is critical for information spread and malware diffusion suppression. In this paper, we propose a novel influential spreader identification method, called SpreadRank, which considers the path reachability in information spreading and uses its quantitative index as a measure of node spread centrality to obtain the spread influence of a single node. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
213“…Such openness, however, can promote serious threats, including malware and illegal usage. In order to prevent such threats, several stores use online authentication techniques. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
214“…Furthermore, the attack-defense game between malware and WRSNs is constructed and the optimal strategies of both players are obtained. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
215por Hagen, Josiah“…The presentation will include how-to’s on classifying malware, looking into encrypted tunnels, and finding botnets in DNS data.…”
Publicado 2015
Enlace del recurso
-
216por Andersson, Jonathan“…He has domain expertise in embedded systems, information security & real-time transaction processing systems, vulnerability & malware analysis, product development & manufacturing, credit card & check processing, optics & pattern recognition systems, image processing, USB storage & media card technology, solar technology, vehicle diagnostic technology, and varied mobile & wireless technologies including software defined radio …”
Publicado 2015
Enlace del recurso
-
217“…Attacks such as botnets and malware injection usually start with a phase of reconnaissance to gather information about the target IoT device before exploitation. …”
Enlace del recurso
Enlace del recurso
Enlace del recurso
Online Artículo Texto -
218por Voulimeneas, Alexios, Song, Dokyung, Parzefall, Fabian, Na, Yeoul, Larsen, Per, Franz, Michael, Volckaert, StijnEnlace del recurso
Publicado 2020
Enlace del recurso
Online Artículo Texto -
219
-
220