咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 5 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 8 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 4 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 1 篇 仪器科学与技术
    • 1 篇 生物工程
  • 1 篇 理学
    • 1 篇 生物学
  • 1 篇 医学

主题

  • 14 篇 executable file
  • 2 篇 lagrange interpo...
  • 2 篇 mimicry (behavio...
  • 2 篇 payload
  • 2 篇 scheme
  • 2 篇 reverse engineer...
  • 2 篇 malware
  • 2 篇 confidential inf...
  • 2 篇 camouflage
  • 2 篇 backdoor data
  • 2 篇 authentication m...
  • 1 篇 input file
  • 1 篇 doc2vec
  • 1 篇 performance
  • 1 篇 network infrastr...
  • 1 篇 compilers
  • 1 篇 instrumentation
  • 1 篇 access control
  • 1 篇 edge commands
  • 1 篇 cursor

机构

  • 1 篇 csir inst genom ...
  • 1 篇 computer science...
  • 1 篇 univ kentucky co...
  • 1 篇 school of electr...
  • 1 篇 univ indonesia e...
  • 1 篇 graduate studies...
  • 1 篇 institute of mat...
  • 1 篇 deakin univ sch ...
  • 1 篇 graduate school ...
  • 1 篇 russian acad sci...
  • 1 篇 deakin univ cybe...
  • 1 篇 esime culhuacan ...
  • 1 篇 adi shankara ins...
  • 1 篇 beijing univ pos...
  • 1 篇 natl def acad de...
  • 1 篇 cdac resource ct...
  • 1 篇 univ salerno dep...
  • 1 篇 school of scienc...
  • 1 篇 school of comput...

作者

  • 1 篇 salman muhammad
  • 1 篇 perez-meana hect...
  • 1 篇 baig zubair
  • 1 篇 huang xiao-jun
  • 1 篇 kurmangaleev sh....
  • 1 篇 gaissaryan s. s.
  • 1 篇 larus jr
  • 1 篇 gallegos-garcia ...
  • 1 篇 mekala sri harsh...
  • 1 篇 yuki kuwahara
  • 1 篇 hector perez-mea...
  • 1 篇 ramachandran s
  • 1 篇 viani nindya
  • 1 篇 palmieri frances...
  • 1 篇 gina gallegos-ga...
  • 1 篇 pizzolante raffa...
  • 1 篇 sharma vk
  • 1 篇 nakano-miyatake ...
  • 1 篇 dija s.
  • 1 篇 ivan castillo-ca...

语言

  • 14 篇 英文
检索条件"主题词=Executable File"
14 条 记 录,以下是1-10 订阅
排序:
Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors
收藏 引用
IT PROFESSIONAL 2023年 第5期25卷 37-44页
作者: Baig, Zubair Mekala, Sri Harsha Zeadally, Sherali Deakin Univ Sch Informat Technol Cybersecur Geelong Vic 3216 Australia Deakin Univ Cybersecur Geelong Vic 3216 Australia Univ Kentucky Coll Commun & Informat Lexington KY 40506 USA
The COVID-19 pandemic has exposed many organizational vulnerabilities to cyber threats, with ransomware being at the top of the list. These can be attributed mainly to consolidated accessibility as organizational visi... 详细信息
来源: 评论
Static Analysis Method on Portable executable files for REMNUX based Malware Identification  10
Static Analysis Method on Portable Executable Files for REMN...
收藏 引用
IEEE 10th International Conference on Awareness Science and Technology (iCAST)
作者: Salman, Muhammad Husna, Diyanatul Viani, Nindya Univ Indonesia Elect Engn Dept Depok Indonesia
Malware is one of the most dangerous threats in the digital world today and in the future. Today, technological developments do not only give benefits but also reap serious challenges. One of the threats is the breach... 详细信息
来源: 评论
A Deep Learning Malicious Code Classification Method Combined with Texture Feature Extraction GSINET  21
A Deep Learning Malicious Code Classification Method Combine...
收藏 引用
Proceedings of the 2021 4th International Conference on Artificial Intelligence and Pattern Recognition
作者: Pengfei Wei Yong Zhang Ling Yue Jialu Xu School of Science and Technology Xi'an University of Posts and Telecommunications China School of Computer Science and Technology Xi'an University of Posts and Telecommunications China and Industry School of Modern Post Xi'an University of Posts and Telecommunications China School of Electronic Engineering Xi'an University of Posts and Telecommunications China
In recent years, malicious code attacks in the field of cyberspace security have become more and more serious. The traditional malicious code detection methods have low detection rate, incomplete feature extraction, t... 详细信息
来源: 评论
On the undetectability of payloads generated through automatic tools: A human-oriented approach
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2021年 第19期33卷 e6351-e6351页
作者: Carpentieri, Bruno Castiglione, Arcangelo Palmieri, Francesco Pizzolante, Raffaele Univ Salerno Dept Comp Sci Fisciano Italy
Nowadays, several tools have been proposed to support the operations performed during a security assessment process. In particular, it is a common practice to rely on automated tools to carry out some phases of this p... 详细信息
来源: 评论
Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques  14
Detecting Unknown Malware from ASCII Strings with Natural La...
收藏 引用
14th Annual Asia Joint Conference on Information Security (AsiaJCIS)
作者: Ito, Ryo Mimura, Mamoru Natl Def Acad Dept Comp Sci Yokosuka Kanagawa Japan
Attackers often use an executable file (malware) as a tool to obtain sensitive information from specific companies and individuals. Anti-virus software attempts to detect the malware by pattern matching method etc. Ho... 详细信息
来源: 评论
Sgi :: Iris4D :: 007-0904-020 Learning to Debug with Edge Fortran Edition V2.0 1988
收藏 引用
2016年
Sgi :: Iris4D :: 007-0904-020 Learning to Debug with Edge Fortran Edition V2.0 1988 by published by
来源: 评论
Application of compiler transformations against software vulnerabilities exploitation
收藏 引用
PROGRAMMING AND COMPUTER SOFTWARE 2015年 第4期41卷 231-236页
作者: Nurmukhametov, A. R. Kurmangaleev, Sh. F. Kaushan, V. V. Gaissaryan, S. S. Russian Acad Sci Inst Syst Programming Moscow 109004 Russia
Software vulnerabilities are a serious threat for security of information systems. Any software written in C/C++ contain considerable amount of vulnerabilities. Some of them can be used by attackers to seize control o... 详细信息
来源: 评论
RocSampler: Regularizing overlapping protein complexes in protein-protein interaction networks
RocSampler: Regularizing overlapping protein complexes in pr...
收藏 引用
IEEE International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)
作者: Osamu Maruyama Yuki Kuwahara Institute of Mathematics for Industry Kyushu University Fukuoka 819-0395 Japan Graduate School of Mathematics Kyushu University Fukuoka 819-0395 Japan
In this paper, we address the problem of protein complex prediction from a PPI network. This problem has two difficulties. One is that small complexes of size two and three are the majority of complexes recorded in da... 详细信息
来源: 评论
Research and Implementation of executable file Compression for Mobile Terminals of MIS
Research and Implementation of Executable File Compression f...
收藏 引用
Global Mobile Congress 2009
作者: Huang Xiao-jun Yang Jing Du Wen Beijing Univ Posts & Telecom Key Lab Univ Wireless Commun Minist Educ Beijing Peoples R China
An executable file compression solution for mobile terminals of MIS was proposed, optimal compression algorithm was selected and ported to BREW platform. Meanwhile, concrete implementation of this proposal was given. ... 详细信息
来源: 评论
Detecting Forensically Relevant Information From PE executables
Detecting Forensically Relevant Information From PE Executab...
收藏 引用
International Conference on Recent Trends in Information Technology (ICRTIT)
作者: Jophin, Shany Vijayan, Meera Dija, S. Adi Shankara Inst Engn & Technol Dept Comp Sci Kalady India CDAC Resource Ctr Cyber Forens Trivandrum Kerala India
Cyber forensics analysis is the procedure to find crucial evidence with respect to a crime from a digital media. Malware forensics and Network security plays a crucial role in the current scenario where malware attack... 详细信息
来源: 评论