咨询与建议

限定检索结果

文献类型

  • 8 篇 会议
  • 5 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 8 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 4 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 1 篇 仪器科学与技术
    • 1 篇 生物工程
  • 1 篇 理学
    • 1 篇 生物学
  • 1 篇 医学

主题

  • 14 篇 executable file
  • 2 篇 lagrange interpo...
  • 2 篇 mimicry (behavio...
  • 2 篇 payload
  • 2 篇 scheme
  • 2 篇 reverse engineer...
  • 2 篇 malware
  • 2 篇 confidential inf...
  • 2 篇 camouflage
  • 2 篇 backdoor data
  • 2 篇 authentication m...
  • 1 篇 input file
  • 1 篇 doc2vec
  • 1 篇 performance
  • 1 篇 network infrastr...
  • 1 篇 compilers
  • 1 篇 instrumentation
  • 1 篇 access control
  • 1 篇 edge commands
  • 1 篇 cursor

机构

  • 1 篇 csir inst genom ...
  • 1 篇 computer science...
  • 1 篇 univ kentucky co...
  • 1 篇 school of electr...
  • 1 篇 univ indonesia e...
  • 1 篇 graduate studies...
  • 1 篇 institute of mat...
  • 1 篇 deakin univ sch ...
  • 1 篇 graduate school ...
  • 1 篇 russian acad sci...
  • 1 篇 deakin univ cybe...
  • 1 篇 esime culhuacan ...
  • 1 篇 adi shankara ins...
  • 1 篇 beijing univ pos...
  • 1 篇 natl def acad de...
  • 1 篇 cdac resource ct...
  • 1 篇 univ salerno dep...
  • 1 篇 school of scienc...
  • 1 篇 school of comput...

作者

  • 1 篇 salman muhammad
  • 1 篇 perez-meana hect...
  • 1 篇 baig zubair
  • 1 篇 huang xiao-jun
  • 1 篇 kurmangaleev sh....
  • 1 篇 gaissaryan s. s.
  • 1 篇 larus jr
  • 1 篇 gallegos-garcia ...
  • 1 篇 mekala sri harsh...
  • 1 篇 yuki kuwahara
  • 1 篇 hector perez-mea...
  • 1 篇 ramachandran s
  • 1 篇 viani nindya
  • 1 篇 palmieri frances...
  • 1 篇 gina gallegos-ga...
  • 1 篇 pizzolante raffa...
  • 1 篇 sharma vk
  • 1 篇 nakano-miyatake ...
  • 1 篇 dija s.
  • 1 篇 ivan castillo-ca...

语言

  • 14 篇 英文
检索条件"主题词=Executable File"
14 条 记 录,以下是11-20 订阅
排序:
On the undetectability of payloads generated through automatic tools: A human-oriented approach
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2021年 第19期33卷 e6351-e6351页
作者: Carpentieri, Bruno Castiglione, Arcangelo Palmieri, Francesco Pizzolante, Raffaele Univ Salerno Dept Comp Sci Fisciano Italy
Nowadays, several tools have been proposed to support the operations performed during a security assessment process. In particular, it is a common practice to rely on automated tools to carry out some phases of this p... 详细信息
来源: 评论
A Deep Learning Malicious Code Classification Method Combined with Texture Feature Extraction GSINET  21
A Deep Learning Malicious Code Classification Method Combine...
收藏 引用
Proceedings of the 2021 4th International Conference on Artificial Intelligence and Pattern Recognition
作者: Pengfei Wei Yong Zhang Ling Yue Jialu Xu School of Science and Technology Xi'an University of Posts and Telecommunications China School of Computer Science and Technology Xi'an University of Posts and Telecommunications China and Industry School of Modern Post Xi'an University of Posts and Telecommunications China School of Electronic Engineering Xi'an University of Posts and Telecommunications China
In recent years, malicious code attacks in the field of cyberspace security have become more and more serious. The traditional malicious code detection methods have low detection rate, incomplete feature extraction, t... 详细信息
来源: 评论
RocSampler: Regularizing overlapping protein complexes in protein-protein interaction networks
RocSampler: Regularizing overlapping protein complexes in pr...
收藏 引用
IEEE International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)
作者: Osamu Maruyama Yuki Kuwahara Institute of Mathematics for Industry Kyushu University Fukuoka 819-0395 Japan Graduate School of Mathematics Kyushu University Fukuoka 819-0395 Japan
In this paper, we address the problem of protein complex prediction from a PPI network. This problem has two difficulties. One is that small complexes of size two and three are the majority of complexes recorded in da... 详细信息
来源: 评论
Improved Secret Image Sharing Scheme with Payload Optimization
Improved Secret Image Sharing Scheme with Payload Optimizati...
收藏 引用
IEEE International Midwest Symposium on Circuits and Systems
作者: Angelina Espejel-Trujillo Ivan Castillo-Camacho Mariko Nakano-Miyatake Gina Gallegos-Garcia Hector Perez-Meana Graduate Studies and Research Section ESIME CULHUACAN-IPN
This paper presents an improvement of interpolation-based (k,n)-threshold secret image sharing (SIS) scheme, where a secret data payload is optimized using Lagrange Interpolation operated in GF(2~8). A secret data can... 详细信息
来源: 评论