咨询与建议

限定检索结果

文献类型

  • 7 篇 会议
  • 6 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 9 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 3 篇 软件工程
    • 2 篇 信息与通信工程
    • 1 篇 交通运输工程

主题

  • 14 篇 malware analysis...
  • 9 篇 machine learning
  • 3 篇 android
  • 2 篇 deep learning
  • 2 篇 adversarial robu...
  • 2 篇 static analysis
  • 2 篇 deep neural netw...
  • 2 篇 artificial intel...
  • 1 篇 intrusion detect...
  • 1 篇 fileless malware
  • 1 篇 smartphones
  • 1 篇 connected vehicl...
  • 1 篇 adversarial lear...
  • 1 篇 automation
  • 1 篇 metamorphism
  • 1 篇 suspicious call ...
  • 1 篇 evasion attack
  • 1 篇 computer securit...
  • 1 篇 malware signatur...
  • 1 篇 dominance tree

机构

  • 2 篇 bits pilani dept...
  • 2 篇 adana alparslan ...
  • 1 篇 univ victoria de...
  • 1 篇 microsoft r & d
  • 1 篇 microsoft r&d se...
  • 1 篇 microsoft r&d se...
  • 1 篇 queens univ sch ...
  • 1 篇 dept. of cs & is...
  • 1 篇 hacettepe univ w...
  • 1 篇 polish acad sci ...
  • 1 篇 securitycompass ...
  • 1 篇 bits pilani sanc...
  • 1 篇 bits pilani k k ...
  • 1 篇 univ victoria de...
  • 1 篇 western univ dep...
  • 1 篇 university of mi...
  • 1 篇 princess sumaya ...
  • 1 篇 univ mannheim la...
  • 1 篇 microsoft r&d hy...
  • 1 篇 univ jeddah dept...

作者

  • 3 篇 rathore hemant
  • 3 篇 alam shahid
  • 3 篇 sewak mohit
  • 2 篇 hemant rathore
  • 2 篇 mohit sewak
  • 2 篇 sen sevil
  • 2 篇 sahay sanjay k.
  • 1 篇 yildirim serdar
  • 1 篇 alharbi soltan a...
  • 1 篇 iqbal shahrear
  • 1 篇 nasereddin moham...
  • 1 篇 sasan animesh
  • 1 篇 taeeb bandwala
  • 1 篇 zulkernine moham...
  • 1 篇 sanjay k. sahay
  • 1 篇 haque anwar
  • 1 篇 holz thorsten
  • 1 篇 cavli omer faruk...
  • 1 篇 traore issa
  • 1 篇 willems carsten

语言

  • 13 篇 英文
  • 1 篇 土耳其文
检索条件"主题词=Malware Analysis and Detection"
14 条 记 录,以下是1-10 订阅
排序:
malware analysis and detection  2
Malware Analysis and Detection
收藏 引用
2nd International Conference on AIML Systems
作者: Rathore, Hemant Sewak, Mohit BITS Pilani Sancoale Goa India Microsoft R&D Hyderabad Telangana India
Often computer/mobile users call everything that disturbs/corrupts their system a VIRUS without being aware of what it means or accomplishes. This tutorial systematically introduces the different malware varieties, th... 详细信息
来源: 评论
malware analysis and detection  22
Malware Analysis and Detection
收藏 引用
Proceedings of the Second International Conference on AI-ML Systems
作者: Hemant Rathore Mohit Sewak BITS Pilani K K Birla Goa Campus India Microsoft R & D India
Often computer/mobile users call everything that disturbs/corrupts their system a VIRUS without being aware of what it means or accomplishes. This tutorial systematically introduces the different malware varieties, th... 详细信息
来源: 评论
A new approach for detecting process injection attacks using memory analysis
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2024年 第3期23卷 2099-2121页
作者: Nasereddin, Mohammed Al-Qassas, Raad Polish Acad Sci IITiS PAN Inst Theoret & Appl Informat PL-44100 Gliwice Poland Princess Sumaya Univ Technol Dept Comp Sci Amman Jordan
This paper introduces a new approach for examining and analyzing fileless malware artifacts in computer memory. The proposed approach offers the distinct advantage of conducting a comprehensive live analysis of memory... 详细信息
来源: 评论
LAM: Scrutinizing Leading APIs For Detecting Suspicious Call Sequences
收藏 引用
COMPUTER JOURNAL 2023年 第11期66卷 2638-2655页
作者: Alam, Shahid Adana Alparslan Turkes Sci & Technol Univ Dept Comp Engn Adana Turkey
The proliferation of smartphones has given exponential rise to the number of new mobile malware. These malware programs are employing stealthy obfuscations to hide their malicious activities. To perform malicious acti... 详细信息
来源: 评论
Defending malware detection models against evasion based adversarial attacks
收藏 引用
PATTERN RECOGNITION LETTERS 2022年 164卷 119-125页
作者: Rathore, Hemant Sasan, Animesh Sahay, Sanjay K. Sewak, Mohit Bits Pilani Dept CS & IS Goa Campus Pilani Rajasthan India Microsoft R&D Secur & Compliance Res New Delhi India
The last decade has witnessed a massive malware boom in the Android ecosystem. Literature suggests that artificial intelligence/machine learning based malware detection models can potentially solve this problem. But, ... 详细信息
来源: 评论
Are malware detection Classifiers Adversarially Vulnerable to Actor-Critic based Evasion Attacks?
收藏 引用
EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS 2022年 第1期10卷
作者: Rathore, Hemant Sharma, Sujay C. Sahay, Sanjay K. Sewak, Mohit BITS Pilani Dept CS & IS Goa Campus Pilani Rajasthan India Microsoft R&D Secur & Compliance Res Bengaluru India
Android devices like smartphones and tablets have become immensely popular and are an integral part of our daily lives. However, it has also attracted malware developers to design android malware which have grown aggr... 详细信息
来源: 评论
Familial Classification of Android malware using Hybrid analysis  13
Familial Classification of Android Malware using Hybrid Anal...
收藏 引用
International Conference on Information Security and Cryptology (ISCTURKEY)
作者: Cavli, Omer Faruk Turan Sen, Sevil Hacettepe Univ WISE Lab Dept Comp Engn Ankara Turkey
With the developments in mobile and wireless technology, mobile devices have become important part of our lives. While Android is the leading operating system in the market share, it is also the most targeted platform... 详细信息
来源: 评论
Are CNN based malware detection Models Robust?: Developing Superior Models using Adversarial Attack and Defense  21
Are CNN based Malware Detection Models Robust?: Developing S...
收藏 引用
Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems
作者: Hemant Rathore Taeeb Bandwala Sanjay K. Sahay Mohit Sewak Dept. of CS & IS Goa Campus BITS Pilani India Security & Compliance Research Microsoft R&D India
The tremendous increase of malicious applications in the android ecosystem has prompted researchers to explore deep learning based malware detection models. However, research in other domains suggests that deep learni... 详细信息
来源: 评论
Mining nested flow of dominant APIs for detecting android malware
收藏 引用
COMPUTER NETWORKS 2020年 第0期167卷 107026-000页
作者: Alam, Shahid Alharbi, Soltan Abed Yildirim, Serdar Adana Alparslan Turkes Sci & Technol Univ Dept Comp Engn Adana Turkey Univ Jeddah Dept Comp & Network Engn Jeddah Saudi Arabia
According to the Kaspersky Lab threat report, mobile malware attacks almost doubled in 2018. A study conducted in 2018 by Accenture found malware attacks to be the most expensive to resolve. Android Operating System (... 详细信息
来源: 评论
Towards a Security Architecture for Protecting Connected Vehicles from malware  89
Towards a Security Architecture for Protecting Connected Veh...
收藏 引用
89th IEEE Vehicular Technology Conference (VTC Spring)
作者: Iqbal, Shahrear Haque, Anwar Zulkernine, Mohammad SecurityCompass Toronto ON Canada Western Univ Dept Comp Sci London ON Canada Queens Univ Sch Comp Kingston ON Canada
Vehicles are becoming increasingly connected to the outside world. We can connect our devices to the vehicle's infotainment system and internet is being added as a functionality. Therefore, security is a major con... 详细信息
来源: 评论