咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 10 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 3 篇 信息与通信工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 安全科学与工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 统计学(可授理学、...

主题

  • 11 篇 opcode sequence
  • 4 篇 malware detectio...
  • 3 篇 machine learning
  • 2 篇 deep learning
  • 2 篇 web shell detect...
  • 1 篇 random walk
  • 1 篇 dictionary size
  • 1 篇 unknown malware ...
  • 1 篇 smart contracts
  • 1 篇 control flow gra...
  • 1 篇 n-grams
  • 1 篇 svm
  • 1 篇 linear discrimin...
  • 1 篇 operand pattem
  • 1 篇 operand list dic...
  • 1 篇 single-class lea...
  • 1 篇 pattern matching
  • 1 篇 operand field re...
  • 1 篇 redundancy
  • 1 篇 dictionaries

机构

  • 1 篇 vnu univ engn & ...
  • 1 篇 zhongguancun lab...
  • 1 篇 istanbul commerc...
  • 1 篇 chinese acad sci...
  • 1 篇 korea univ grad ...
  • 1 篇 islamic azad uni...
  • 1 篇 gebze tech univ ...
  • 1 篇 tianjin universi...
  • 1 篇 deustotech univ ...
  • 1 篇 univ chinese aca...
  • 1 篇 natl chiao tung ...
  • 1 篇 xian technol uni...
  • 1 篇 univ west scotla...
  • 1 篇 chinese acad sci...
  • 1 篇 shenzhen univ to...
  • 1 篇 nile univ sch co...
  • 1 篇 off govt hanoi v...
  • 1 篇 islamic azad uni...

作者

  • 1 篇 cao yagin
  • 1 篇 chung cp
  • 1 篇 sogukpinar ibrah...
  • 1 篇 zhang yumei
  • 1 篇 moon jongsub
  • 1 篇 van-on phung
  • 1 篇 keir paul
  • 1 篇 dai wei
  • 1 篇 marco-gisbert he...
  • 1 篇 tan ru
  • 1 篇 yan shengli
  • 1 篇 dai feng
  • 1 篇 brezo f.
  • 1 篇 guo you
  • 1 篇 kakisim arzu gor...
  • 1 篇 zhang jinli
  • 1 篇 jeon seungho
  • 1 篇 lin k
  • 1 篇 bringas p. g.
  • 1 篇 ding yuxin

语言

  • 10 篇 英文
  • 1 篇 其他
检索条件"主题词=Opcode sequence"
11 条 记 录,以下是1-10 订阅
排序:
Android Ransomware Detection Using Reduced opcode sequence And Image Similarity  7
Android Ransomware Detection Using Reduced Opcode Sequence A...
收藏 引用
7th International Conference on Computer and Knowledge Engineering (ICCKE)
作者: Karimi, Alireza Moattar, Mohammad Hosein Islamic Azad Univ Dept Comp Engn Shahrud Branch Mashhad Iran Islamic Azad Univ Dept Comp Engn Mashhad Branch Mashhad Iran
Nowadays Ransomwares are not limited to personal computers. Increasing the number of people accessing cell phones, availability of mobile phone application markets along with lack of an effective way for identifying R... 详细信息
来源: 评论
Malware Detection using opcode Trigram sequence with SVM  26
Malware Detection using Opcode Trigram Sequence with SVM
收藏 引用
26th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
作者: Elkhawas, Amr, I Abdelbaki, Nashwa Nile Univ Sch Commun & Informat Technol Informat Secur Cairo Egypt
Malicious software also known as "Malware" is software that uses legitimate instructions or code to perform malicious actions. Malware poses a major threat for computer security and information security in g... 详细信息
来源: 评论
Using opcode sequences in single-class learning to detect unknown malware
收藏 引用
IET INFORMATION SECURITY 2011年 第4期5卷 220-227页
作者: Santos, I. Brezo, F. Sanz, B. Laorden, C. Bringas, P. G. DeustoTech Univ Deusto Lab Smartness Semant & Secur Lab S3 Bilbao 48007 Spain
Malware is any type of malicious code that has the potential to harm a computer or network. The volume of malware is growing at a faster rate every year and poses a serious global security threat. Although signature-b... 详细信息
来源: 评论
Malware-Detection Method with a Convolutional Recurrent Neural Network Using opcode sequences
收藏 引用
INFORMATION SCIENCES 2020年 535卷 1-15页
作者: Jeon, Seungho Moon, Jongsub Korea Univ Grad Sch Informat Secur Div Informat Secur Seoul South Korea
This paper presents a novel malware-detection model with a convolutional recurrent neural network using opcode sequences. Statistically, an executable file is considered as a set of consecutive machine codes. First, t... 详细信息
来源: 评论
Code compression techniques using operand field remapping
收藏 引用
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES 2002年 第1期149卷 25-31页
作者: Lin, K Chung, CP Natl Chiao Tung Univ Dept Comp Sci & Informat Engn Hsinchu 300 Taiwan
Dictionary-based code compression stores the most frequently used instruction sequences in a dictionary, and replaces the occurrences of these sequences in the program with codewords. The large dictionary size is due ... 详细信息
来源: 评论
Control flow-based opcode behavior analysis for Malware detection
收藏 引用
COMPUTERS & SECURITY 2014年 44卷 65-74页
作者: Ding, Yuxin Dai, Wei Yan, Shengli Zhang, Yumei Shenzhen Univ Town Harbin Inst Technol Shenzhen Grad Sch Shenzhen 518055 Peoples R China Chinese Acad Sci State Key Lab Comp Architecture Inst Comp Technol Beijing 100864 Peoples R China
opcode sequences from decompiled executables have been employed to detect malware. Currently, opcode sequences are extracted using text-based methods, and the limitation of this method is that the extracted opcode seq... 详细信息
来源: 评论
Toward a Deep Learning Approach for Detecting PHP Webshell  19
Toward a Deep Learning Approach for Detecting PHP Webshell
收藏 引用
10th International Symposium on Information and Communication Technology (SoICT)
作者: Ngoc-Hoa Nguyen Viet-Ha Le Van-On Phung Phuong-Hanh Du VNU Univ Engn & Technol Hanoi Vietnam Off Govt Hanoi Vietnam
The most efficient way of securing Web applications is searching and eliminating threats therein (from both malwares and vulnerabilities). In case of having Web application source codes, Web security can be improved b... 详细信息
来源: 评论
SWDNet: Stealth Web Shell Detection Technology based on Triplet Network  19
SWDNet: Stealth Web Shell Detection Technology based on Trip...
收藏 引用
19th International Conference on Mobility, Sensing and Networking (MSN)
作者: Zhang, Jinli Dai, Feng Cao, Yagin Tan, Ru Cui, Xiang Liu, Qixu Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China Zhongguancun Lab Beijing Peoples R China
Amid escalating cyber threats, websites have emerged as predominant targets for attackers employing web shells to maintain extended control. Web shells, frequently used by Advanced Persistent Threat (APT) groups, ofte... 详细信息
来源: 评论
Research on Dynamic Detection of Vulnerabilities in Smart Contracts Based on Machine Learning  3
Research on Dynamic Detection of Vulnerabilities in Smart Co...
收藏 引用
3rd IEEE International Conference on Electrical Engineering, Big Data and Algorithms, EEBDA 2024
作者: Boxin, Yang Tianjin University of Technology Tianjin China
The proliferation of smart contracts has led to a surge in hacking attacks, resulting in substantial financial losses and undermining the healthy growth of the blockchain ecosystem. To mitigate these challenges, this ... 详细信息
来源: 评论
Sequential opcode embedding-based malware detection method
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2022年 98卷 107703-107703页
作者: Kakisim, Arzu Gorgulu Gulmez, Sibel Sogukpinar, Ibrahim Istanbul Commerce Univ Comp Engn Istanbul Turkey Gebze Tech Univ Comp Engn Kocaeli Turkey
In recent years, researchers have focused on uncovering the distinctive malicious patterns of malware samples through opcode sequences using some feature learning methods to improve the accuracy of malware detection m... 详细信息
来源: 评论