咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 26 篇 期刊文献

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 49 篇 工学
    • 36 篇 计算机科学与技术...
    • 18 篇 电气工程
    • 12 篇 信息与通信工程
    • 8 篇 软件工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
  • 10 篇 理学
    • 4 篇 物理学
    • 3 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 53 篇 malicious code d...
  • 10 篇 machine learning
  • 7 篇 deep learning
  • 4 篇 static analysis
  • 4 篇 network security
  • 3 篇 data mining
  • 3 篇 cybersecurity
  • 3 篇 security
  • 3 篇 malware
  • 3 篇 javascript
  • 2 篇 quantum computin...
  • 2 篇 collaborative tr...
  • 2 篇 obfuscation feat...
  • 2 篇 iot
  • 2 篇 binary analysis
  • 2 篇 classification a...
  • 2 篇 artificial immun...
  • 2 篇 classification
  • 2 篇 slicing
  • 2 篇 malicious featur...

机构

  • 3 篇 ben gurion univ ...
  • 2 篇 informat engn un...
  • 2 篇 henan police col...
  • 1 篇 china elect prod...
  • 1 篇 daffodil int uni...
  • 1 篇 pla informat eng...
  • 1 篇 state grid zheji...
  • 1 篇 acad sinica inst...
  • 1 篇 department of co...
  • 1 篇 zibo vocat inst ...
  • 1 篇 univ nebraska de...
  • 1 篇 univ arizona dep...
  • 1 篇 tungnan univ dep...
  • 1 篇 west univ timiso...
  • 1 篇 sichuan univ col...
  • 1 篇 national taiwan ...
  • 1 篇 china elect powe...
  • 1 篇 guangxi univ gua...
  • 1 篇 shandong univ sc...
  • 1 篇 telcordia techno...

作者

  • 4 篇 moskovitch rober...
  • 4 篇 elovici yuval
  • 3 篇 feher clint
  • 3 篇 zhang yu
  • 2 篇 xiong qibing
  • 2 篇 liu xin
  • 2 篇 cui zhihua
  • 2 篇 du qiming
  • 2 篇 liu zhen
  • 2 篇 tang yongwang
  • 2 篇 deng qizheng
  • 2 篇 lan zhuoxuan
  • 2 篇 fei yangyang
  • 2 篇 zhang binquan
  • 2 篇 pungila ciprian
  • 2 篇 shan zheng
  • 1 篇 bezobrazov serge...
  • 1 篇 huang cheng
  • 1 篇 wu hongcheng
  • 1 篇 li daofeng

语言

  • 51 篇 英文
  • 2 篇 其他
检索条件"主题词=Malicious Code Detection"
53 条 记 录,以下是1-10 订阅
排序:
SMCD: Privacy-preserving deep learning based malicious code detection
收藏 引用
COMPUTERS & SECURITY 2025年 150卷
作者: Mu, Gaoli Zhang, Hanlin Lin, Jie Kong, Fanyu Qingdao Univ Coll Comp Sci & Technol Qingdao 266071 Peoples R China Xi An Jiao Tong Univ Sch Comp Sci & Technol Xian 710049 Peoples R China Shandong Univ Sch Comp Sci & Technol Jinan 250100 Peoples R China
With the rapid development of the Internet, malicious code has been continuously exposing security issues, posing a significant threat to people's online lives. Deep learning has shown significant impact in the fi... 详细信息
来源: 评论
A modified lightweight quantum convolutional neural network for malicious code detection
收藏 引用
QUANTUM SCIENCE AND TECHNOLOGY 2025年 第1期10卷 015007-015007页
作者: Xiong, Qibing Fei, Yangyang Du, Qiming Zhao, Bo Di, Shiqin Shan, Zheng Informat Engn Univ Zhengzhou 450000 Peoples R China Henan Police Coll Zhengzhou 450000 Peoples R China
Quantum neural network fully utilize the respective advantages of quantum computing and classical neural network, providing a new path for the development of artificial intelligence. In this paper, we propose a modifi... 详细信息
来源: 评论
Review of malicious code detection in data mining applications: challenges, algorithms, and future direction
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2025年 第3期28卷 1-37页
作者: Razaque, Abdul Bektemyssova, Gulnara Yoo, Joon Hariri, Salim Khan, Meer Jaro Nalgozhina, Nurgul Hwang, Jaeryong Khan, M. Ajmal Gachon Univ Sch Comp Seongnam Gyeonggi Do South Korea Int Informat Technol Univ Dept Comp Engn Manas 34-1 Alma Ata Kazakhstan Univ Arizona Dept Elect & Comp Engn Tucson AZ USA ROK Naval Acad Dept Cyber Sci Chang Won South Korea Ohio Northern Univ Dept Elect & Comp Engn Ada OH 45810 USA Satbayev Univ Int Dept Alma Ata Kazakhstan
In an era where machine learning critically underpins business operations, detecting vulnerabilities introduced by malicious code has become increasingly essential. Although prior research has extensively explored mal... 详细信息
来源: 评论
A hybrid quantum ensemble learning model for malicious code detection
收藏 引用
QUANTUM SCIENCE AND TECHNOLOGY 2024年 第3期9卷 035021-035021页
作者: Xiong, Qibing Ding, Xiaodong Fei, Yangyang Zhou, Xin Du, Qiming Feng, Congcong Shan, Zheng Informat Engn Univ Zhengzhou 450000 Peoples R China Henan Police Coll Zhengzhou 450000 Peoples R China
Quantum computing as a new computing model with parallel computing capability and high information carrying capacity, has attracted a lot of attention from researchers. Ensemble learning is an effective strategy often... 详细信息
来源: 评论
A Full-Lifecycle malicious code detection Scheme Based on RASP and Random Forest  20th
A Full-Lifecycle Malicious Code Detection Scheme Based on RA...
收藏 引用
20th International Conference on Intelligent Computing (ICIC)
作者: Cheng, Jiameng Zhang, Chenhao Zhang, Hongwei Wang, Cong Wang, Jinsong Tianjin Univ Technol Sch Comp Sci & Engn Tianjin 300384 Peoples R China Tianjin Univ Sci & Technol Sch Comp Sci & Engn Tianjin 300457 Peoples R China
As cloud computing continues to evolve, computational power leasing has emerged as a novel web service model, providing users with access to computing resources or cloud computing capabilities. This enables users to o... 详细信息
来源: 评论
malicious code detection based on many-objective transfer model
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2023年 第22期35卷 e7728-e7728页
作者: Zhang, Binquan Wu, Di Lan, Zhuoxuan Cui, Zhihua Xie, Liping Taiyuan Univ Sci & Technol Shanxi Key Lab Big Data Anal & Parallel Comp Taiyuan 030024 Peoples R China Beijing Univ Technol Coll Comp Sci & Technol Beijing Peoples R China
With the rapid growth of malicious codes, personal privacy, and Internet security are seriously threatened. Existing transfer learning-based malicious code detection improves detection accuracy by transferring pre-tra... 详细信息
来源: 评论
malicious code detection Based on code Semantic Features
收藏 引用
IEEE ACCESS 2020年 8卷 176728-176737页
作者: Zhang, Yu Li, Binglong Informat Engn Univ Coll Cryptog Engn Zhengzhou 450000 Peoples R China
With the development of smart phones, malicious applications for the Android platform have increased dramatically. The existing Android malicious code analysis methods majorly focus on detection based on signatures, i... 详细信息
来源: 评论
malicious code detection for Trusted Execution Environment Based on Paillier Homomorphic Encryption
收藏 引用
IEICE TRANSACTIONS ON COMMUNICATIONS 2020年 第3期E103B卷 155-166页
作者: Wang, Ziwang Zhuang, Yi Nanjing Univ Aeronaut & Astronaut Dept Comp Sci & Technol Nanjing Peoples R China
Currently, mobile terminals face serious security threats. A Trusted Execution Environment (TEE) which can provide an isolated execution environment for sensitive workloads, is seen as a trusted relay for providing se... 详细信息
来源: 评论
A malicious code detection Method Based on Stacked Depthwise Separable Convolutions and Attention Mechanism
收藏 引用
SENSORS 2023年 第16期23卷 7084-7084页
作者: Huang, Hong Du, Rui Wang, Zhaolian Li, Xin Yuan, Guotao Sichuan Univ Sci & Engn Sch Comp Sci & Engn Yibin 644002 Peoples R China
To address the challenges of weak model generalization and limited model capacity adaptation in traditional malware detection methods, this article presents a novel malware detection approach based on stacked depthwis... 详细信息
来源: 评论
A malicious code detection Method Based on FF-MICNN in the Internet of Things
收藏 引用
SENSORS 2022年 第22期22卷 8739页
作者: Zhang, Wenbo Feng, Yongxin Han, Guangjie Zhu, Hongbo Tan, Xiaobo Shenyang Ligong Univ Sch Informat Sci & Engn Shenyang 110159 Peoples R China Hohai Univ Dept Informat & Commun Syst Changzhou 213022 Peoples R China
It is critical to detect malicious code for the security of the Internet of Things (IoT). Therefore, this work proposes a malicious code detection algorithm based on the novel feature fusion-malware image convolutiona... 详细信息
来源: 评论