咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 26 篇 期刊文献

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 49 篇 工学
    • 36 篇 计算机科学与技术...
    • 18 篇 电气工程
    • 12 篇 信息与通信工程
    • 8 篇 软件工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
  • 10 篇 理学
    • 4 篇 物理学
    • 3 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 53 篇 malicious code d...
  • 10 篇 machine learning
  • 7 篇 deep learning
  • 4 篇 static analysis
  • 4 篇 network security
  • 3 篇 data mining
  • 3 篇 cybersecurity
  • 3 篇 security
  • 3 篇 malware
  • 3 篇 javascript
  • 2 篇 quantum computin...
  • 2 篇 collaborative tr...
  • 2 篇 obfuscation feat...
  • 2 篇 iot
  • 2 篇 binary analysis
  • 2 篇 classification a...
  • 2 篇 artificial immun...
  • 2 篇 classification
  • 2 篇 slicing
  • 2 篇 malicious featur...

机构

  • 3 篇 ben gurion univ ...
  • 2 篇 informat engn un...
  • 2 篇 henan police col...
  • 1 篇 china elect prod...
  • 1 篇 daffodil int uni...
  • 1 篇 pla informat eng...
  • 1 篇 state grid zheji...
  • 1 篇 acad sinica inst...
  • 1 篇 department of co...
  • 1 篇 zibo vocat inst ...
  • 1 篇 univ nebraska de...
  • 1 篇 univ arizona dep...
  • 1 篇 tungnan univ dep...
  • 1 篇 west univ timiso...
  • 1 篇 sichuan univ col...
  • 1 篇 national taiwan ...
  • 1 篇 china elect powe...
  • 1 篇 guangxi univ gua...
  • 1 篇 shandong univ sc...
  • 1 篇 telcordia techno...

作者

  • 4 篇 moskovitch rober...
  • 4 篇 elovici yuval
  • 3 篇 feher clint
  • 3 篇 zhang yu
  • 2 篇 xiong qibing
  • 2 篇 liu xin
  • 2 篇 cui zhihua
  • 2 篇 du qiming
  • 2 篇 liu zhen
  • 2 篇 tang yongwang
  • 2 篇 deng qizheng
  • 2 篇 lan zhuoxuan
  • 2 篇 fei yangyang
  • 2 篇 zhang binquan
  • 2 篇 pungila ciprian
  • 2 篇 shan zheng
  • 1 篇 bezobrazov serge...
  • 1 篇 huang cheng
  • 1 篇 wu hongcheng
  • 1 篇 li daofeng

语言

  • 51 篇 英文
  • 2 篇 其他
检索条件"主题词=Malicious Code Detection"
53 条 记 录,以下是1-10 订阅
排序:
SMCD: Privacy-preserving deep learning based malicious code detection
收藏 引用
COMPUTERS & SECURITY 2025年 150卷
作者: Mu, Gaoli Zhang, Hanlin Lin, Jie Kong, Fanyu Qingdao Univ Coll Comp Sci & Technol Qingdao 266071 Peoples R China Xi An Jiao Tong Univ Sch Comp Sci & Technol Xian 710049 Peoples R China Shandong Univ Sch Comp Sci & Technol Jinan 250100 Peoples R China
With the rapid development of the Internet, malicious code has been continuously exposing security issues, posing a significant threat to people's online lives. Deep learning has shown significant impact in the fi... 详细信息
来源: 评论
A modified lightweight quantum convolutional neural network for malicious code detection
收藏 引用
QUANTUM SCIENCE AND TECHNOLOGY 2025年 第1期10卷 015007-015007页
作者: Xiong, Qibing Fei, Yangyang Du, Qiming Zhao, Bo Di, Shiqin Shan, Zheng Informat Engn Univ Zhengzhou 450000 Peoples R China Henan Police Coll Zhengzhou 450000 Peoples R China
Quantum neural network fully utilize the respective advantages of quantum computing and classical neural network, providing a new path for the development of artificial intelligence. In this paper, we propose a modifi... 详细信息
来源: 评论
Review of malicious code detection in data mining applications: challenges, algorithms, and future direction
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2025年 第3期28卷 1-37页
作者: Razaque, Abdul Bektemyssova, Gulnara Yoo, Joon Hariri, Salim Khan, Meer Jaro Nalgozhina, Nurgul Hwang, Jaeryong Khan, M. Ajmal Gachon Univ Sch Comp Seongnam Gyeonggi Do South Korea Int Informat Technol Univ Dept Comp Engn Manas 34-1 Alma Ata Kazakhstan Univ Arizona Dept Elect & Comp Engn Tucson AZ USA ROK Naval Acad Dept Cyber Sci Chang Won South Korea Ohio Northern Univ Dept Elect & Comp Engn Ada OH 45810 USA Satbayev Univ Int Dept Alma Ata Kazakhstan
In an era where machine learning critically underpins business operations, detecting vulnerabilities introduced by malicious code has become increasingly essential. Although prior research has extensively explored mal... 详细信息
来源: 评论
malicious code detection Based on code Semantic Features
收藏 引用
IEEE ACCESS 2020年 8卷 176728-176737页
作者: Zhang, Yu Li, Binglong Informat Engn Univ Coll Cryptog Engn Zhengzhou 450000 Peoples R China
With the development of smart phones, malicious applications for the Android platform have increased dramatically. The existing Android malicious code analysis methods majorly focus on detection based on signatures, i... 详细信息
来源: 评论
malicious code detection for Trusted Execution Environment Based on Paillier Homomorphic Encryption
收藏 引用
IEICE TRANSACTIONS ON COMMUNICATIONS 2020年 第3期E103B卷 155-166页
作者: Wang, Ziwang Zhuang, Yi Nanjing Univ Aeronaut & Astronaut Dept Comp Sci & Technol Nanjing Peoples R China
Currently, mobile terminals face serious security threats. A Trusted Execution Environment (TEE) which can provide an isolated execution environment for sensitive workloads, is seen as a trusted relay for providing se... 详细信息
来源: 评论
malicious code detection on Smart Meters - A Side-Channel Based Approach  3
Malicious Code Detection on Smart Meters - A Side-Channel Ba...
收藏 引用
IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)
作者: Wang, Haixiang Li, Jiyuan Zhang, Tianchen Ying, Huan Han, Jiajia Ji, Xiaoyu Grad Sch China Elect Power Res Inst Beijing Peoples R China State Grid Zhejiang Elect Power Res Inst Hangzhou Zhejiang Peoples R China Zhejiang Univ Coll Elect Engn Hangzhou Zhejiang Peoples R China China Elect Power Res Inst Informat & Commun Dept Beijing Peoples R China
With the continuous development of smart grids, smart meter, one of the typical embedded equipment, is also becoming more intellectualized. Smart meters nowadays are capable of not only recording power consumption, bu... 详细信息
来源: 评论
A hybrid quantum ensemble learning model for malicious code detection
收藏 引用
QUANTUM SCIENCE AND TECHNOLOGY 2024年 第3期9卷
作者: Xiong, Qibing Ding, Xiaodong Fei, Yangyang Zhou, Xin Du, Qiming Feng, Congcong Shan, Zheng Informat Engn Univ Zhengzhou 450000 Peoples R China Henan Police Coll Zhengzhou 450000 Peoples R China
Quantum computing as a new computing model with parallel computing capability and high information carrying capacity, has attracted a lot of attention from researchers. Ensemble learning is an effective strategy often... 详细信息
来源: 评论
A Hybrid malicious code detection Method based on Deep Learning
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2015年 第5期9卷 205-215页
作者: Li, Yuancheng Ma, Rong Jiao, Runhai North China Elect Power Univ Sch Control & Comp Engn Beijing Peoples R China
In this paper;we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This co... 详细信息
来源: 评论
malicious code detection based on many-objective transfer model
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2023年 第22期35卷 e7728-e7728页
作者: Zhang, Binquan Wu, Di Lan, Zhuoxuan Cui, Zhihua Xie, Liping Taiyuan Univ Sci & Technol Shanxi Key Lab Big Data Anal & Parallel Comp Taiyuan 030024 Peoples R China Beijing Univ Technol Coll Comp Sci & Technol Beijing Peoples R China
With the rapid growth of malicious codes, personal privacy, and Internet security are seriously threatened. Existing transfer learning-based malicious code detection improves detection accuracy by transferring pre-tra... 详细信息
来源: 评论
Immunity-Based Model for malicious code detection
Immunity-Based Model for Malicious Code Detection
收藏 引用
6th International Conference on Intelligent Computing
作者: Zhang, Yu Wu, Lihua Xia, Feng Liu, Xiaowen Hainan Normal Univ Coll Informat Sci & Technol Haikou 571158 Peoples R China
More and more unknown malware that hide itself in the operating system kernel make the traditional antivirus difficult to detect Inspired by the biological immune system we proposed a novel immunity inspired model for... 详细信息
来源: 评论