咨询与建议

限定检索结果

文献类型

  • 34 篇 会议
  • 29 篇 期刊文献

馆藏范围

  • 63 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 60 篇 工学
    • 54 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 10 篇 软件工程
    • 8 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 网络空间安全
  • 3 篇 理学
    • 3 篇 数学
    • 1 篇 系统科学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 法学

主题

  • 63 篇 api calls
  • 19 篇 machine learning
  • 10 篇 malware
  • 10 篇 malware detectio...
  • 9 篇 ransomware
  • 9 篇 dynamic analysis
  • 8 篇 permissions
  • 7 篇 deep learning
  • 6 篇 feature selectio...
  • 5 篇 android malware
  • 5 篇 android
  • 5 篇 malware analysis
  • 4 篇 android apps
  • 4 篇 static analysis
  • 4 篇 classification
  • 3 篇 emulators
  • 3 篇 frequent pattern...
  • 3 篇 convolutional ne...
  • 2 篇 mlp
  • 2 篇 cyber security

机构

  • 4 篇 dav univ dept co...
  • 4 篇 dr br ambedkar n...
  • 2 篇 harbin inst tech...
  • 2 篇 alexandru ioan c...
  • 2 篇 hebei univ techn...
  • 2 篇 univ saskatchewa...
  • 2 篇 univ sargodha de...
  • 1 篇 mnit jaipur raja...
  • 1 篇 ajman univ artif...
  • 1 篇 kadir has univ c...
  • 1 篇 yangzhou univ sc...
  • 1 篇 univ aquila i-67...
  • 1 篇 wpafb afrl dayto...
  • 1 篇 galala univ fac ...
  • 1 篇 victoria univ we...
  • 1 篇 college of compu...
  • 1 篇 istanbul medeniy...
  • 1 篇 north carolina a...
  • 1 篇 lnm inst informa...
  • 1 篇 dav univ dept co...

作者

  • 5 篇 mahindru arvind
  • 4 篇 sangal a. l.
  • 3 篇 balan gheorghe
  • 3 篇 kapp david
  • 3 篇 ralescu anca
  • 3 篇 kebede temesgen
  • 2 篇 nawaz m. saqib
  • 2 篇 chen guoting
  • 2 篇 wu youxi
  • 2 篇 nafi kawser waze...
  • 2 篇 roy chanchal k.
  • 2 篇 fournier-viger p...
  • 2 篇 luchian henri
  • 2 篇 ngwobia sunday c...
  • 2 篇 roy banani
  • 2 篇 nawaz m. zohaib
  • 2 篇 gavrilut dragos ...
  • 2 篇 schneider kevin ...
  • 2 篇 bou-harb elias
  • 1 篇 vaikunthan p.

语言

  • 63 篇 英文
检索条件"主题词=API calls"
63 条 记 录,以下是1-10 订阅
排序:
RanViz: Ransomware Visualization and Classification Based on Time-Series Categorical Representation of api calls
收藏 引用
IEEE ACCESS 2025年 13卷 56237-56254页
作者: Mokoma, Vhuhwavho Singh, Avinash Univ Pretoria Dept Comp Sci ZA-0002 Pretoria South Africa
Ransomware continues to pose a significant threat to individuals and organizations worldwide, causing disruptions, financial losses, and reputational damage. As ransomware attacks grow in sophistication, understanding... 详细信息
来源: 评论
Android Malware Detection Method Based on Permission Complement and api calls
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 773-785页
作者: YANG Jiyun TANG Jiang YAN Ran XIANG Tao College of Computer Science Chongqing University
The dynamic code loading mechanism of the Android system allows an application to load executable files externally at runtime. This mechanism makes the development of applications more convenient, but it also brings s... 详细信息
来源: 评论
Intelligent mobile malware detection using permission requests and api calls
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2020年 107卷 509-521页
作者: Alazab, Moutaz Alazab, Mamoun Shalaginov, Andrii Mesleh, Abdelwadood Awajan, Albara Al Balqa Appl Univ Fac Artificial Intelligence Salt Jordan Charles Darwin Univ Coll Engn IT & Environm Darwin NT Australia Norwegian Univ Sci & Technol Fac Informat Technol & Elect Engn Trondheim Norway
Malware is a serious threat that has been used to target mobile devices since its inception. Two types of mobile malware attacks are standalone: fraudulent mobile apps and injected malicious apps. Defending against th... 详细信息
来源: 评论
Feature mining and classifier selection for api calls-based malware detection
收藏 引用
APPLIED INTELLIGENCE 2023年 第23期53卷 29094-29108页
作者: Balan, Gheorghe Simion, Ciprian-Alin Gavrilut, Dragos Teodor Luchian, Henri Alexandru Ioan Cuza Univ Fac Comp Sci Iasi Romania Bitdefender Cyber Threat Intelligence Lab Iasi Romania
This paper deals with a major challenge in cyber-security: the need to respond to ever renewed techniques used by attackers in order to avoid detection based on analysing static features of malware. These constantly r... 详细信息
来源: 评论
STATIC DETECTION OF ANDROID MALWARE BY USING PERMISSIONS AND api calls  13
STATIC DETECTION OF ANDROID MALWARE BY USING PERMISSIONS AND...
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Chan, Patrick P. K. Song, Wen-Kai South China Univ Technol Dept Comp Sci & Technol Guangzhou 510006 Guangdong Peoples R China
Android smart phones have become more and more popular due to its increasing functionalities, compatibility and convenience. More and more Android applications have been developed and can be downloaded easily from app... 详细信息
来源: 评论
Mining api calls and Permissions for Android Malware Detection  13
Mining API Calls and Permissions for Android Malware Detecti...
收藏 引用
13th International Conference on Cryptology and Network Security (CANS)
作者: Sharma, Akanksha Dash, Subrat Kumar LNM Inst Informat Technol Dept Comp Sci & Engn Jaipur Rajasthan India
The popularity of Android platform is increasing very sharply due to the large market share of Android and openness in nature. The increased popularity is making Android an enticing target for malwares. A worrying tre... 详细信息
来源: 评论
Using api calls for Sequence-Pattern Feature Mining-Based Malware Detection  17th
Using API Calls for Sequence-Pattern Feature Mining-Based Ma...
收藏 引用
17th International Conference on Information Security Practice and Experience (ISPEC)
作者: Balan, Gheorghe Gavrilut, Dragos Teodor Luchian, Henri Alexandru Ioan Cuza Univ Fac Comp Sci IaSi Bitdefender Labs Iasi Romania Alexandru Ioan Cuza Univ Fac Comp Sci Iasi Iasi Romania
This paper presents an ANN-based approach to malware detection focused on sequence-pattern feature mining. Some prevalent malware families (Emotet, Trickbot) try to deceive detection algorithms by automatically changi... 详细信息
来源: 评论
Analysis of api calls with 'A' and 'W' suffixes used in parent and child processes for ransomware detection  12
Analysis of API calls with 'A' and 'W' suffixes used in pare...
收藏 引用
12th International Symposium on Computing and Networking
作者: Matsuda, Yoshiki Takahashi, Kenichi Higashino, Masayuki Kawamura, Takao Tottori Univ Grad Sch Sustainabil Sci Tottori Japan Tottori Univ Cross Informat Res Ctr Grad Sch Sustainabil Sci Tottori Japan
In recent years, the impact of ransomware attacks has been increasing. Consequently, numerous studies on ransomware detection have been conducted. These studies often focus on the api calls used by ransomware. Ransomw... 详细信息
来源: 评论
Malware Detection using api calls Visualisations and Convolutional Neural Networks  23
Malware Detection using API Calls Visualisations and Convolu...
收藏 引用
23rd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGrid)
作者: Pizarro Barona, Jaime Avila Alvarez, Joseph Jimenez Farfan, Carlos Marquez Aguilar, Joangie Bonilla, Rafael I. Escuela Super Politecn Litoral Fac Ingn Elect & Computac Guayaquil Ecuador
This research explores and analyzes different api calls sequence transformation methods into images to train deep learning models and determine which combination of these methods and models performs better. We generat... 详细信息
来源: 评论
Multiclass Malware Classification Using Either Static Opcodes or Dynamic api calls  35th
Multiclass Malware Classification Using Either Static Opcode...
收藏 引用
35th Australasian Joint Conference on Artificial Intelligence (AI)
作者: Chanajitt, Rajchada Pfahringer, Bernhard Gomes, Heitor Murilo Yogarajan, Vithya Univ Waikato Dept Comp Sci Hamilton New Zealand Victoria Univ Wellington Sch Engn & Comp Sci Wellington New Zealand Univ Auckland Sch Comp Sci Auckland New Zealand
Today's malware variants are growing at an unprecedented rate. To avoid detection by existing antivirus engines, attackers have been increasing the complexity of packers, layers of obfuscation, and encryption to o... 详细信息
来源: 评论