咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 6 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 生物学
  • 1 篇 文学
    • 1 篇 外国语言文学

主题

  • 7 篇 malware analysis
  • 1 篇 deep learning
  • 1 篇 evasion detectio...
  • 1 篇 anns
  • 1 篇 linux malware
  • 1 篇 support vector m...
  • 1 篇 methodology anal...
  • 1 篇 privacy function
  • 1 篇 dynamic binary i...
  • 1 篇 malicious code
  • 1 篇 feature extracti...
  • 1 篇 cyber threat int...
  • 1 篇 image classifica...
  • 1 篇 artificial intel...
  • 1 篇 forced execution
  • 1 篇 convolutional ne...
  • 1 篇 iot malware
  • 1 篇 privacy petri ne...
  • 1 篇 cyber security
  • 1 篇 malware classifi...

机构

  • 1 篇 departamento de ...
  • 1 篇 school of comput...
  • 1 篇 the health infor...
  • 1 篇 school of cyber ...
  • 1 篇 unité de recherc...
  • 1 篇 escuela superior...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 northern border ...
  • 1 篇 institute of com...
  • 1 篇 jinyinhu laborat...
  • 1 篇 key lab of medic...
  • 1 篇 school of comput...
  • 1 篇 curriculums and ...
  • 1 篇 national compute...
  • 1 篇 services computi...
  • 1 篇 department of co...
  • 1 篇 hubei key labora...
  • 1 篇 national enginee...
  • 1 篇 school of comput...

作者

  • 1 篇 李静远
  • 1 篇 lojain nahhas
  • 1 篇 manuel sánchez r...
  • 1 篇 ellis inglut
  • 1 篇 abdulbasit a.dar...
  • 1 篇 程学旗
  • 1 篇 koné tiémoman
  • 1 篇 羌卫中
  • 1 篇 王元卓
  • 1 篇 javier bermejo h...
  • 1 篇 ying he
  • 1 篇 林闯
  • 1 篇 juan antonio sic...
  • 1 篇 marwan albahar
  • 1 篇 achi harrisson t...
  • 1 篇 徐钫洲
  • 1 篇 金海
  • 1 篇 n’guessan behou ...
  • 1 篇 juan ramón berme...
  • 1 篇 joséjavier de vi...

语言

  • 6 篇 英文
  • 1 篇 中文
检索条件"主题词=malware analysis"
7 条 记 录,以下是1-10 订阅
排序:
MMALE—A Methodology for malware analysis in Linux Environments
收藏 引用
Computers, Materials & Continua 2021年 第5期67卷 1447-1469页
作者: JoséJavier de Vicente Mohino Javier Bermejo Higuera Juan Ramón Bermejo Higuera Juan Antonio Sicilia Montalvo Manuel Sánchez Rubio JoséJavier Martínez Herraiz Escuela Superior de Ingeniería y Tecnología Universidad Internacional de La RiojaLogroño26006La RiojaSpain Departamento de Ciencias de la Computación de la Escuela Politécnica Superior Universidad de Alcaláde HenaresAlcaláde HenaresMadridSpain
In a computer environment,an operating system is prone to malware,and even the Linux operating system is not an exception.In recent years,malware has evolved,and attackers have become more qualified compared to a few ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Android malware Detection Using ResNet-50 Stacking
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 3997-4014页
作者: Lojain Nahhas Marwan Albahar Abdullah Alammari Anca Jurcut Department of Computer Science Umm Al Qura UniversityP.O.Box 715MeccaSaudi Arabia Curriculums and Teaching Department Faculty of EducationUmm Al Qura UniversityP.O.Box 715MeccaSaudi Arabia School of Computer Science University College DublinBelfieldDublinIreland
There has been an increase in attacks on mobile devices,such as smartphones and tablets,due to their growing popularity.Mobile malware is one of the most dangerous threats,causing both security breaches and financial ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Framework for Windows malware Detection Using a Deep Learning Approach
收藏 引用
Computers, Materials & Continua 2022年 第7期72卷 461-479页
作者: Abdulbasit A.Darem Northern Border University Arar9280Saudi Arabia
Malicious software(malware)is one of the main cyber threats that organizations and Internet users are currently facing.malware is a software code developed by cybercriminals for damage purposes,such as corrupting the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
malware incident response(IR) informed by cyber threat intelligence(CTI)
收藏 引用
Science China(Information Sciences) 2022年 第7期65卷 256-258页
作者: Ying HE Ellis INGLUT Cunjin LUO School of Computer Science and Informatics De Montfort University Key Lab of Medical Electrophysiology Ministry of Education The Health Informatics Group Institute of Cardiovascular Research Southwest Medical University School of Computer Science and Engineering Northeastern University
Dear editor, Security experts have been fighting against cybercriminals for many years and existing research shows that this battle will continue. Malicious software has no remorse when it targets different organizati... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Privacy Petri Net and Privacy Leak Software
收藏 引用
Journal of Computer Science & Technology 2015年 第6期30卷 1318-1343页
作者: 范乐君 王元卓 李静远 程学旗 林闯 National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Department of Computer Science and Technology Tsinghua University Beijing 100083 China
Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging probl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
malware Detection Using Deep Learning
收藏 引用
Open Journal of Applied Sciences 2023年 第12期13卷 2480-2491页
作者: Achi Harrisson Thiziers Koné Tiémoman N’guessan Behou Gérard Traoré Tiémoko Qouddouss Kabir Unité de Recherche et d’Expertise Numérique (UREN) Université Virtuelle de C&#244te d’Ivoire Abidjan C&#244te d’Ivoire
malware represents a real threat to information systems, because of the damage it causes. This threat is growing today, as these programs take on more complex forms. This means they escape traditional malware detectio... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
基于污点和概率的逃逸恶意软件多路径探索
Security and Safety
收藏 引用
Security and Safety 2023年 第3期2卷 83-106页
作者: 徐钫洲 张网 羌卫中 金海 National Engineering Research Center for Big Data Technology and System Wuhan 430074China Services Computing Technology and System Lab Cluster and Grid Computing LabWuhan 430074China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data SecurityWuhan 430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Jinyinhu Laboratory Wuhan 430040China
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution information.Unfortu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论