咨询与建议

限定检索结果

文献类型

  • 49 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 50 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 36 篇 计算机科学与技术...
    • 10 篇 信息与通信工程
    • 10 篇 网络空间安全
    • 9 篇 电气工程
    • 8 篇 控制科学与工程
    • 8 篇 软件工程
    • 7 篇 材料科学与工程(可...
    • 6 篇 电子科学与技术(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
  • 8 篇 理学
    • 8 篇 数学
    • 1 篇 统计学(可授理学、...
  • 8 篇 医学
    • 8 篇 临床医学
  • 7 篇 管理学
    • 6 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学

主题

  • 50 篇 malware
  • 10 篇 android
  • 8 篇 security
  • 7 篇 analysis
  • 6 篇 machine learning
  • 5 篇 deep learning
  • 4 篇 classification
  • 3 篇 attacks
  • 3 篇 iot
  • 3 篇 防病毒软件
  • 3 篇 detection
  • 3 篇 mobile
  • 3 篇 feature
  • 2 篇 clustering
  • 2 篇 phishing
  • 2 篇 dynamic
  • 2 篇 static analysis
  • 2 篇 android security
  • 2 篇 signature
  • 2 篇 virus

机构

  • 1 篇 department of co...
  • 1 篇 najran universit...
  • 1 篇 college of infor...
  • 1 篇 department of co...
  • 1 篇 school of engine...
  • 1 篇 zte corporation
  • 1 篇 department of in...
  • 1 篇 school of comput...
  • 1 篇 chinese academy ...
  • 1 篇 department of in...
  • 1 篇 the graduate sch...
  • 1 篇 nacolabs consult...
  • 1 篇 department of so...
  • 1 篇 internet commerc...
  • 1 篇 key laboratory o...
  • 1 篇 university of ch...
  • 1 篇 department of co...
  • 1 篇 中国印刷技术协会
  • 1 篇 department of co...
  • 1 篇 department of co...

作者

  • 2 篇 ansam khraisat
  • 1 篇 khaled soliman
  • 1 篇 沙赢
  • 1 篇 wen-jie sun
  • 1 篇 ajit narayanan
  • 1 篇 xiangyu liu
  • 1 篇 yanna wu
  • 1 篇 赖谷鑫
  • 1 篇 xuyan song
  • 1 篇 yi qing
  • 1 篇 陈光
  • 1 篇 farman ali
  • 1 篇 nitin naik
  • 1 篇 yanbing liu
  • 1 篇 oju onuoha
  • 1 篇 shaoyin cheng
  • 1 篇 yunpeng xiao
  • 1 篇 zheng shan
  • 1 篇 aisha m. alshiky
  • 1 篇 he hongjun luo l...

语言

  • 43 篇 英文
  • 7 篇 中文
检索条件"主题词=Malware"
50 条 记 录,以下是1-10 订阅
排序:
Covalent Bond Based Android malware Detection Using Permission and System Call Pairs
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 4283-4301页
作者: Rahul Gupta Kapil Sharma R.K.Garg Department of Information Technology Delhi Technological UniversityNew Delhi110042India Department of Mechanical Engineering Deenbandhu Chhotu Ram University of Science and TechnologyMurthal131039India
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
malware Attacks Detection in IoT Using Recurrent Neural Network(RNN)
收藏 引用
Intelligent Automation & Soft Computing 2024年 第2期39卷 135-155页
作者: Abeer Abdullah Alsadhan Abdullah A.Al-Atawi Hanen karamti Abid Jameel Islam Zada Tan N.Nguyen Computer Science Department Imam Abdulrahman Bin Faisal UniversityDamam32232Saudi Arabia Department of Computer Science Applied CollegeUniversity of TabukTabuk47512Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences and Information Technology Hazara UniversityMansehraPakistan Faculty of Computing Department of Software EngineeringInternational Islamic UniversityIslamabadPakistan Department of Architectural Engineering Sejong UniversitySeoul05006Korea
IoT(Internet of Things)devices are being used more and more in a variety of businesses and for a variety of tasks,such as environmental data collection in both civilian and military situations.They are a desirable att... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1419-1439页
作者: Khaled Soliman Mohamed Sobh Ayman M.Bahaa-Eldin Department of Computer and Systems Engineering Ain Shams UniversityCairo11517Egypt Department of Computer Engineering Technology ElSewedy University of TechnologyCairo44629Egypt
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Framework for understanding intention-unbreakable malware
收藏 引用
Science China(Information Sciences) 2023年 第4期66卷 174-192页
作者: Tiantian JI Binxing FANG Xiang CUI Zhongru WANG Peng LIAO Shouyou SONG Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of Education Beijing University of Posts and Telecommunications Cyberspace Institute of Advanced Technology Guangzhou University Chinese Academy of Cyberspace Studies Beijing Dig Apis Technology Co. Ltd.
The anti-analysis technology of malware has always been the focus in the cyberspace security field. As malware analysis techniques evolve, malware writers continually employ sophisticated anti-reverse engineering tech... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A malware propagation prediction model based on representation learning and graph convolutional networks
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1090-1100页
作者: Tun Li Yanbing Liu Qilie Liu Wei Xu Yunpeng Xiao Hong Liu College of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China
The traditional malware research is mainly based on its recognition and detection as a breakthrough point,without focusing on its propagation trends or predicting the subsequently infected nodes.The complexity of netw... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Using Capsule Networks for Android malware Detection Through Orientation-Based Features
收藏 引用
Computers, Materials & Continua 2022年 第3期70卷 5345-5362页
作者: Sohail Khan Mohammad Nauman Suleiman Ali Alsaif Toqeer Ali Syed Hassan Ahmad Eleraky Deanship of Preparatory Year and Supporting Studies Computer Science DepartmentImam Abdulrahman Bin Faisal UniversityDammamSaudi Arabia National University of Computer and Emerging Sciences Pakistan Department of Computer Science Islamic University of MedinaMedinaSaudi Arabia
Mobile phones are an essential part of modern life.The two popular mobile phone platforms,Android and iPhone Operating System(iOS),have an immense impact on the lives of millions of people.Among these two,Android curr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
malware homology identification based on a gene perspective
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2019年 第6期20卷 801-815页
作者: Bing-lin ZHAO Zheng SHAN Fu-dong LIU Bo ZHAO Yi-hang CHEN Wen-jie SUN State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China Georg-August-University of Goettingen Goettingen 37077 Germany
malware homology identification is important in attacking event tracing, emergency response scheme generation, and event trend prediction. Current malware homology identification methods still rely on manual analysis,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
MBB-IoT:Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 2095-2119页
作者: Yi Qing Xiangyu Liu Yanhui Du Department of Artificial Intelligence People’s Public Security University of ChinaBeijing100038China Department of Cybersecurity People’s Public Security University of ChinaBeijing100038China
Distributed Denial of Service(DDoS)attacks have always been a major concern in the security field.With the release of malware source codes such as BASHLITE and Mirai,Internet of Things(IoT)devices have become the new ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
JShellDetector: A Java FilelessWebshell Detector Based on Program Analysis
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 2061-2078页
作者: Xuyan Song Yiting Qin Xinyao Liu Baojiang Cui Junsong Fu School of Cyber Security Beijing University of Posts and TelecommunicationsBeijing100876China
Fileless webshell attacks against Java web applications have becomemore frequent in recent years as Java has gained market share. Webshell is amalicious script that can remotely execute commands and invade servers. It... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论