咨询与建议

限定检索结果

文献类型

  • 33 册 图书
  • 24 篇 期刊文献
  • 24 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 84 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 44 篇 计算机科学与技术...
    • 16 篇 软件工程
    • 7 篇 电气工程
    • 7 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 交通运输工程
    • 1 篇 食品科学与工程(可...
    • 1 篇 安全科学与工程
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 84 篇 opcode
  • 11 篇 malware detectio...
  • 9 篇 operand
  • 9 篇 instruction
  • 8 篇 malware
  • 8 篇 data
  • 8 篇 assembler
  • 7 篇 convolutional ne...
  • 6 篇 webshell
  • 6 篇 byte
  • 6 篇 machine learning
  • 6 篇 classification
  • 5 篇 malware classifi...
  • 5 篇 location counter
  • 5 篇 android
  • 5 篇 mode
  • 4 篇 symbol
  • 4 篇 stack
  • 4 篇 macro
  • 4 篇 deep learning

机构

  • 2 篇 northeastern uni...
  • 2 篇 vit univ sch com...
  • 2 篇 shiraz univ dept...
  • 2 篇 harbin institute...
  • 1 篇 amrita vishwa vi...
  • 1 篇 univ sci & techn...
  • 1 篇 phys opt corp 20...
  • 1 篇 xinjiang univ ne...
  • 1 篇 karlsruhe inst t...
  • 1 篇 victoria univ we...
  • 1 篇 tsinghua univ ts...
  • 1 篇 chinese acad sci...
  • 1 篇 inner mongolia u...
  • 1 篇 univ hong kong d...
  • 1 篇 中国科学院大学
  • 1 篇 scms sch engn & ...
  • 1 篇 hunan univ coll ...
  • 1 篇 natl secur res i...
  • 1 篇 河南交通职业技术...
  • 1 篇 vnr vjiet bachup...

作者

  • 4 篇 hamzeh ali
  • 2 篇 li dan
  • 2 篇 shi wenbo
  • 2 篇 manavi farnoush
  • 2 篇 xue zhi
  • 2 篇 zhang xiaosong
  • 2 篇 ding yuxin
  • 2 篇 shi yong
  • 2 篇 mercaldo frances...
  • 2 篇 martinelli fabio
  • 2 篇 xiao xi
  • 2 篇 zhao lichao
  • 2 篇 zhang han
  • 2 篇 kumar rajesh
  • 2 篇 sangaiah arun ku...
  • 2 篇 khan riaz ullah
  • 1 篇 huang cheng
  • 1 篇 张涵
  • 1 篇 choi changhee
  • 1 篇 priyanka v

语言

  • 75 篇 英文
  • 9 篇 中文
检索条件"主题词=opcode"
84 条 记 录,以下是1-10 订阅
排序:
MobileNet-Based IoT Malware Detection with opcode Features
收藏 引用
Journal of Communications and Information Networks 2023年 第3期8卷 221-230页
作者: Changren Mai Riqing Liao Jing Ren Yuanxiang Gong Kaibo Zhang Chiya Zhang Harbin Institute of Technology Shenzhen 518055China University of Electronic Science and Technology of China Chengdu 611731China
In recent years,with the rapid development of Internet and hardware technologies,the number of Internet of things(IoT)devices has grown ***,IoT devices are constrained by power consumption,making the security of IoT *... 详细信息
来源: 评论
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding
收藏 引用
COMPUTERS & SECURITY 2019年 84卷 376-392页
作者: Zhang, Jixin Qin, Zheng Yin, Hui Ou, Lu Zhang, Kehuan Hunan Univ Coll Informat Sci & Engn Changsha Hunan Peoples R China Chinese Univ Hong Kong Dept Informat Engn Hong Kong Peoples R China Changsha Univ Coll Comp Sci & Technol Changsha Hunan Peoples R China
Being able to detect malware variants is a critical problem due to the potential damages and the fast paces of new malware variations. According to surveys from McAfee and Symantec, there is about 69 new instances of ... 详细信息
来源: 评论
opcode sequence analysis of Android malware by a convolutional neural network
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2020年 第18期32卷 e5308-e5308页
作者: Li, Dan Zhao, Lichao Cheng, Qingfeng Lu, Ning Shi, Wenbo Northeastern Univ Sch Comp Sci & Engn Shenyang Peoples R China State Key Lab Math Engn & Adv Comp Zhengzhou Peoples R China Xidian Univ Sch Comp Sci & Technol Xian Peoples R China Northeastern Univ Qinhuangdao Sch Comp & Commun Engn Qinhuangdao 066004 Hebei Peoples R China
The number of malware has exploded due to the openness of the Android platform, and the endless stream of malware poses a threat to the privacy, tariffs, and device of mobile phone users. A novel Android mobile malwar... 详细信息
来源: 评论
Detecting Vulnerability in Hardware Description Languages: opcode Language Processing
收藏 引用
IEEE EMBEDDED SYSTEMS LETTERS 2024年 第2期16卷 222-226页
作者: Ayar, Alaaddin Goktug Sahruri, Abdullah Aygun, Sercan Moghadam, Mehran Shoushtari Najafi, M. Hassan Margala, Martin Univ Louisiana Lafayette Sch Comp & Informat Lafayette LA 70503 USA
Detecting vulnerable code blocks has become a highly popular topic in computer-aided design, especially with the advancement of natural language processing (NLP). Analyzing hardware description languages (HDLs), such ... 详细信息
来源: 评论
opcode Sequence Amplifier using Sequence Generative Adversarial Networks  10
Opcode Sequence Amplifier using Sequence Generative Adversar...
收藏 引用
10th International Conference on Information and Communication Technology Convergence (ICTC) - ICT Convergence Leading the Autonomous Future
作者: Choi, Changhee Shin, Sunguk Lee, Inseop Agcy Def Dev Daejeon South Korea
Weapon systems and military networks are threatened by increased cyber attacks. In case of usual cyber attack, commercial grade defence systems are available. Because of speciality of military system, cyber attacks fo... 详细信息
来源: 评论
Identification of malicious android app using manifest and opcode features
收藏 引用
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2017年 第2期13卷 125-138页
作者: Varsha, M. V. Vinod, P. Dhanya, K. A. SCMS Sch Engn & Technol Dept Comp Sci & Engn Ernakulam Kerala India Amrita Vishwa Vidyapeetham Univ Amrita Sch Engn Ctr Cyber Secur Coimbatore Tamil Nadu India
In this paper, we propose a statistical approach for smartphone malware detection. A set of features such as hardware, permission, application components, filtered intents, opcodes and strings are extracted from the s... 详细信息
来源: 评论
Unknown Malcode Detection Using opcode Representation
Unknown Malcode Detection Using OPCODE Representation
收藏 引用
1st European Conference on Intelligence and Security Informatics
作者: Moskovitch, Robert Feher, Clint Tzachar, Nir Berger, Eugene Gitelman, Marina Dolev, Shlomi Elovici, Yuval Ben Gurion Univ Negev Deutsch Telekom Labs IL-84105 Beer Sheva Israel
The recent growth in network usage has motivated the creation of new malicious code for various purposes, including economic ones. Today's signature-based anti-viruses are very accurate, but cannot detect new mali... 详细信息
来源: 评论
A New Method for Malware Detection Using opcode Visualization  19
A New Method for Malware Detection Using Opcode Visualizatio...
收藏 引用
19th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP)
作者: Manavi, Farnoush Hamzeh, Ali Shiraz Univ Dept Comp Sci & Engn & IT Shiraz Iran
Malware is a program that is developed with malicious purpose, such as sabotage the computer system, information theft or other malicious actions. Various methods have been defined for detecting and classifying malwar... 详细信息
来源: 评论
Malware Detection Based on opcode Sequence and ResNet  2nd
Malware Detection Based on Opcode Sequence and ResNet
收藏 引用
2nd International Conference on Security with Intelligent Computing and Big-data Services (SICBS)
作者: Zhang, Xuetao Sun, Meng Wang, Jiabao Wang, Jinshuang Army Engn Univ PLA Dept Cyberspace Secur Nanjing 210000 Jiangsu Peoples R China
Nowadays, it is challenging for traditional static malware detection method to keep pace with the rapid development of malware variants, therefore machine learning based malware detection approaches begin to flourish.... 详细信息
来源: 评论
Deep Neural Network Based on Android Mobile Malware Detection System Using opcode Sequences  18
Deep Neural Network Based on Android Mobile Malware Detectio...
收藏 引用
18th IEEE International Conference on Communication Technology (IEEE ICCT)
作者: Zhao, Lichao Li, Dan Zheng, Guangcong Shi, Wenbo Northeastern Univ Coll Comp Sci & Engn Shenyang Liaoning Peoples R China Northeastern Univ Qinhuangdao Sch Comp & Commun Engn Qinhuangdao Peoples R China
Malware detection is more challenging due to the increase in android malicious programs and the current problems of android malicious detection. This paper proposes an android mobile malware detection system based on ... 详细信息
来源: 评论