咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 4 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 电气工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 5 篇 malware image cl...
  • 2 篇 siamese convolut...
  • 2 篇 one-shot learnin...
  • 2 篇 average hash
  • 1 篇 deep learning
  • 1 篇 h-curve
  • 1 篇 iot cyber-securi...
  • 1 篇 computer vision
  • 1 篇 code obfuscation
  • 1 篇 convolutional ne...
  • 1 篇 iot malware
  • 1 篇 space-filling cu...

机构

  • 1 篇 future univ hako...
  • 1 篇 indian inst tech...
  • 1 篇 tech univ dublin...
  • 1 篇 kyushu univ fuku...
  • 1 篇 tech univ dublin...
  • 1 篇 kyoto tachibana ...
  • 1 篇 department of co...
  • 1 篇 royal holloway u...
  • 1 篇 natl chengchi un...
  • 1 篇 department of in...
  • 1 篇 cent police univ...

作者

  • 1 篇 hsiao shou-ching
  • 1 篇 kao da-yu
  • 1 篇 prasad sanjiva
  • 1 篇 raylin tso
  • 1 篇 da-yu kao
  • 1 篇 o'shaughnessy st...
  • 1 篇 sgandurra daniel...
  • 1 篇 tso raylin
  • 1 篇 shou-ching hsiao
  • 1 篇 su jiawei
  • 1 篇 immure hiroshi
  • 1 篇 feng yaokai
  • 1 篇 liu zi-yuan
  • 1 篇 ishida shigemi
  • 1 篇 nakamura yoshita...
  • 1 篇 vargas danilo va...
  • 1 篇 zi-yuan liu
  • 1 篇 sato hayato
  • 1 篇 sakurai kouichi
  • 1 篇 long david

语言

  • 5 篇 英文
检索条件"主题词=Malware Image Classification"
5 条 记 录,以下是1-10 订阅
排序:
malware image classification Using One-Shot Learning with Siamese Networks
Malware Image Classification Using One-Shot Learning with Si...
收藏 引用
23rd KES International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES)
作者: Hsiao, Shou-Ching Kao, Da-Yu Liu, Zi-Yuan Tso, Raylin Natl Chengchi Univ Dept Comp Sci Taipei Taiwan Cent Police Univ Dept Informat Management Taoyuan Taiwan
Machine learning has largely applied to malware detection and classification, due to the ineffectiveness of signature-based method toward rapid malware proliferation. Although state-of-the-art machine learning models ... 详细信息
来源: 评论
malware image classification Using One-Shot Learning with Siamese Networks
收藏 引用
Procedia Computer Science 2019年 159卷 1863-1871页
作者: Shou-Ching Hsiao Da-Yu Kao Zi-Yuan Liu Raylin Tso Department of Computer Science National Chengchi University Taipei Taiwan Department of Information Management Central Police University Taoyuan Taiwan
Machine learning has largely applied to malware detection and classification, due to the ineffectiveness of signature-based method toward rapid malware proliferation. Although state-of-the-art machine learning models ... 详细信息
来源: 评论
Plain Source Code Obfuscation as an Effective Attack Method on IoT malware image classification  47
Plain Source Code Obfuscation as an Effective Attack Method ...
收藏 引用
47th IEEE-Computer-Society Annual International Conference on Computers, Software, and Applications (COMPSAC)
作者: Sato, Hayato Immure, Hiroshi Ishida, Shigemi Nakamura, Yoshitaka Future Univ Hakodate Sch Syst Informat Sci Hakodate Japan Kyoto Tachibana Univ Fac Engn Kyoto Japan
IoT malware is rapidly increasing due to variants easily generated from publicly available source codes. malware image classification capable of fast and accurate malware identification attracts attention. Since the c... 详细信息
来源: 评论
Lightweight classification of IoT malware Based on image Recognition  42
Lightweight Classification of IoT Malware Based on Image Rec...
收藏 引用
42nd Annual IEEE-Computer-Society Computers, Software and Applications (COMPSAC) Conference - Staying Smarter in a Smartening World
作者: Su, Jiawei Vargas, Danilo Vasconcellos Prasad, Sanjiva Sgandurra, Daniele Feng, Yaokai Sakurai, Kouichi Kyushu Univ Fukuoka Japan Indian Inst Technol Delhi Delhi India Royal Holloway Univ London London England
The Internet of Things (IoT) is an extension of the traditional Internet, which allows a very large number of smart devices, such as home appliances, network cameras, sensors and controllers to connect to one another ... 详细信息
来源: 评论
Shallow Deep Learning using Space-filling Curves for malware classification
Shallow Deep Learning using Space-filling Curves for Malware...
收藏 引用
17th International Conference on Cyber Warfare and Security (ICCWS)
作者: Long, David O'Shaughnessy, Stephen Tech Univ Dublin Appl Cybersecur Dublin Ireland Tech Univ Dublin Dublin Ireland
The incidents of malware attacks are continually increasing at a rapid rate, thanks to the lucrative potential in schemes such as ransomware, credential stealing Trojans and cryptominers. Their explosive growth is com... 详细信息
来源: 评论