咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 2 篇 网络空间安全
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 2 篇 evasion techniqu...
  • 1 篇 two-stage classi...
  • 1 篇 pattern classifi...
  • 1 篇 anomaly detectio...
  • 1 篇 trees (mathemati...
  • 1 篇 guiding principl...
  • 1 篇 adversarial atta...
  • 1 篇 security of data
  • 1 篇 behavior-based d...
  • 1 篇 portable documen...
  • 1 篇 delayed strategy
  • 1 篇 malicious files
  • 1 篇 malicious pdf cl...
  • 1 篇 cryptocurrency m...
  • 1 篇 robust feature e...
  • 1 篇 two-stage machin...
  • 1 篇 cryptojacking
  • 1 篇 document handlin...
  • 1 篇 feature extracti...
  • 1 篇 tree-like inform...

机构

  • 1 篇 graduate school ...
  • 1 篇 school of comput...
  • 1 篇 college of intel...
  • 1 篇 state key labora...
  • 1 篇 big data school ...

作者

  • 1 篇 shaoying liu
  • 1 篇 wenyu dong
  • 1 篇 lin wei
  • 1 篇 he yubo
  • 1 篇 lixiao gong
  • 1 篇 wenqing lei
  • 1 篇 xi zheng
  • 1 篇 liu long
  • 1 篇 guangquan xu
  • 1 篇 jian liu
  • 1 篇 he kang
  • 1 篇 meiqi feng
  • 1 篇 zhu yuefei
  • 1 篇 lu bin
  • 1 篇 jun xing

语言

  • 2 篇 英文
检索条件"主题词=evasion techniques"
2 条 记 录,以下是1-10 订阅
排序:
Detection of Malicious PDF Files Using a Two-Stage Machine Learning Algorithm
收藏 引用
Chinese Journal of Electronics 2020年 第6期29卷 1165-1177页
作者: HE Kang ZHU Yuefei HE Yubo LIU Long LU Bin LIN Wei State Key Laboratory of Mathematical Engineering and Advanced Computing
Portable document format(PDF) files are increasingly used to launch cyberattacks due to their popularity and increasing number of *** solutions have been developed to detect malicious files,but their accuracy decrease... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Delay-CJ:A novel cryptojacking covert attack method based on delayed strategy and its detection
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1169-1179页
作者: Guangquan Xu Wenyu Dong Jun Xing Wenqing Lei Jian Liu Lixiao Gong Meiqi Feng Xi Zheng Shaoying Liu Big Data School Qingdao Huanghai UniversityQingdao266427China College of Intelligence and Computing Tianjin UniversityTianjin300350China School of Computing Macquarie UniversityNSW2109Australia Graduate School of Advanced Science and Engineering Hiroshima UniversityJapan
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain *** has been common since 2017,and in fact,it once became the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论