咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 5 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 1 篇 电气工程
  • 2 篇 医学
    • 2 篇 临床医学

主题

  • 7 篇 intrusion/anomal...
  • 3 篇 visualization ap...
  • 3 篇 human-centered c...
  • 3 篇 visualization
  • 3 篇 security and pri...
  • 2 篇 software and app...
  • 2 篇 systems security
  • 2 篇 network security
  • 2 篇 information visu...
  • 1 篇 cyber attacks
  • 1 篇 network performa...
  • 1 篇 visual analytics
  • 1 篇 adversarial ai
  • 1 篇 visualization de...
  • 1 篇 artificial intel...
  • 1 篇 intrusion detect...
  • 1 篇 learning paradig...
  • 1 篇 usability in sec...
  • 1 篇 distributed comp...
  • 1 篇 cybersecurity

机构

  • 1 篇 univ salento lec...
  • 1 篇 innovative cogni...
  • 1 篇 delft univ techn...
  • 1 篇 lawrence berkele...
  • 1 篇 natl tsing hua u...
  • 1 篇 division of engi...
  • 1 篇 two six labs arl...
  • 1 篇 texas a&m univ c...
  • 1 篇 shenyang univ te...
  • 1 篇 rochester inst t...
  • 1 篇 university of ca...
  • 1 篇 data machines co...
  • 1 篇 two six technol ...
  • 1 篇 punch cyber anal...

作者

  • 2 篇 gove robert
  • 1 篇 kim jinoh
  • 1 篇 verwer sicco
  • 1 篇 chan jonathan h.
  • 1 篇 chou jerry
  • 1 篇 nadeem azqa
  • 1 篇 christopher krue...
  • 1 篇 danneman nathan
  • 1 篇 habib nuzaira
  • 1 篇 sim alex
  • 1 篇 deason lauren
  • 1 篇 yang shanchieh j...
  • 1 篇 thanapattheeraku...
  • 1 篇 lin shibo
  • 1 篇 e shengguo
  • 1 篇 li shuo
  • 1 篇 kazimierczak mat...
  • 1 篇 zhong ling
  • 1 篇 cafaro massimo

语言

  • 7 篇 英文
检索条件"主题词=Intrusion/anomaly detection and malware mitigation"
7 条 记 录,以下是1-10 订阅
排序:
An Improved Method for Dynamic Taint Analysis  24
An Improved Method for Dynamic Taint Analysis
收藏 引用
International Conference on Power Electronics and Artificial Intelligence (PEAI)
作者: Zhong, Ling E, Shengguo Lin, Shibo Li, Shuo Shenyang Univ Technol 111 Shenliao West Rd Shenyang Liaoning Peoples R China
Dynamic taint analysis methods, due to their language independence, reliance on binary code, and high accuracy, have been widely applied in the field of binary program vulnerability detection and security. However, th... 详细信息
来源: 评论
Tuning Automatic Summarization for Incident Report Visualization  15
Tuning Automatic Summarization for Incident Report Visualiza...
收藏 引用
IEEE 15th Pacific Visualization Symposium (PacificVis)
作者: Danneman, Nathan Gove, Robert Data Machines Corp Ashburn VA 20147 USA Two Six Technol Arlington VA USA
We present a machine learning approach to improve the accuracy of summarized incident report visualizations for cyber security. We extend a recent incident report summarization method by training a Bayesian hierarchic... 详细信息
来源: 评论
SNTA'22: The 5thWorkshop on Systems and Network Telemetry and Analytics  22
SNTA'22: The 5thWorkshop on Systems and Network Telemetry an...
收藏 引用
31st International Symposium on High-Performance Parallel and Distributed Computing (HPDC)
作者: Kim, Jinoh Cafaro, Massimo Chou, Jerry Sim, Alex Texas A&M Univ Commerce TX 75428 USA Univ Salento Lecce LE Italy Natl Tsing Hua Univ Hsinchu Taiwan Lawrence Berkeley Natl Lab Berkeley CA USA
HPC and distributed systems are the driving force for the advancement of many emerging technologies, such as exascale systems, quantum machines, terabit networking, 5G/6G wireless, and cloud/edge computing. The tasks ... 详细信息
来源: 评论
SAGE: intrusion Alert-driven Attack Graph Extractor
SAGE: Intrusion Alert-driven Attack Graph Extractor
收藏 引用
IEEE Symposium on Visualization for Cyber Security (VizSec)
作者: Nadeem, Azqa Verwer, Sicco Yang, Shanchieh Jay Delft Univ Technol Delft Netherlands Rochester Inst Technol Rochester NY 14623 USA
Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a network. State-of-the-art approaches for AG generation focus mostly on deriving dependencies between system vulnerabilities ba... 详细信息
来源: 评论
Impact of AI on the Cyber Kill Chain: A Systematic Review
收藏 引用
Heliyon 2024年 第24期10卷 e40699页
作者: Kazimierczak, Mateusz Habib, Nuzaira Chan, Jonathan H. Thanapattheerakul, Thanyathorn Division of Engineering Science University of Toronto Toronto Canada Innovative Cognitive Computing (IC2) Research Center School of Information Technology (SIT) King Mongkut's University of Technology Thonburi Bangkok Thailand
The Cyber Kill Chain (CKC) defense model aims to assist subject matter experts in planning, identifying, and executing against cyber intrusion activity, by outlining seven stages required for adversaries to execute an... 详细信息
来源: 评论
Visualizing Automatically Detected Periodic Network Activity
Visualizing Automatically Detected Periodic Network Activity
收藏 引用
15th IEEE Symposium on Visualization for Cyber Security (VizSec)
作者: Gove, Robert Deason, Lauren Two Six Labs Arlington VA 22203 USA PUNCH Cyber Analyt Grp Ashburn VA USA
malware frequently leaves periodic signals in network logs, but these signals are easily drowned out by non-malicious periodic network activity, such as software updates and other polling activity. This paper describe... 详细信息
来源: 评论
Fighting malicious code: an eternal struggle  14
Fighting malicious code: an eternal struggle
收藏 引用
Proceedings of the 9th ACM symposium on Information, computer and communications security
作者: Christopher Kruegel University of California Santa Barbara Santa Barbara CA USA
Despite many years of research and significant commercial investment, the malware problem is far from being solved (or even reasonably well contained). Every week, the mainstream press publishes articles that describe... 详细信息
来源: 评论