咨询与建议

限定检索结果

文献类型

  • 67 篇 期刊文献
  • 20 册 图书
  • 17 篇 学位论文
  • 15 篇 会议
  • 3 篇 资讯

馆藏范围

  • 122 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 88 篇 工学
    • 77 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 19 篇 网络空间安全
    • 7 篇 信息与通信工程
    • 6 篇 电气工程
    • 4 篇 仪器科学与技术
    • 3 篇 控制科学与工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 公安技术
  • 16 篇 管理学
    • 13 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 5 篇 理学
    • 5 篇 数学
    • 1 篇 统计学(可授理学、...
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 122 篇 powershell
  • 21 篇 windows
  • 11 篇 server
  • 6 篇 microsoft
  • 6 篇 恶意代码
  • 5 篇 sharepoint
  • 5 篇 python
  • 5 篇 深度学习
  • 4 篇 命令
  • 4 篇 deobfuscation
  • 4 篇 自动化
  • 4 篇 windows server
  • 4 篇 xgboost
  • 4 篇 abstract syntax ...
  • 4 篇 脚本
  • 3 篇 doc2vec
  • 3 篇 deep learning
  • 3 篇 目标主机
  • 3 篇 automation
  • 3 篇 安全

机构

  • 5 篇 brno university ...
  • 3 篇 中国科学院大学
  • 2 篇 中国人民公安大学
  • 2 篇 湖北文理学院
  • 2 篇 西安电子科技大学
  • 2 篇 qi anxin technol...
  • 2 篇 哈尔滨工业大学
  • 2 篇 威海职业学院
  • 1 篇 lehigh univ 8b e...
  • 1 篇 czestochowa tech...
  • 1 篇 vellore inst tec...
  • 1 篇 univ limerick li...
  • 1 篇 chinese acad sci...
  • 1 篇 anal grp vancouv...
  • 1 篇 acad appl tech &...
  • 1 篇 cagliari state u...
  • 1 篇 magicshield inc ...
  • 1 篇 neuro occupation...
  • 1 篇 tampere universi...
  • 1 篇 abissi srl ex ss...

作者

  • 3 篇 郭建伟
  • 3 篇 mimura mamoru
  • 2 篇 yang jianqiang
  • 2 篇 ying lingyun
  • 2 篇 青成
  • 2 篇 杨建强
  • 2 篇 magnus palmblad
  • 2 篇 duan haixin
  • 2 篇 赵永华
  • 2 篇 高鹏超
  • 2 篇 chai huajun
  • 2 篇 tajiri yui
  • 2 篇 yassene mohammed
  • 2 篇 雷鑫焱
  • 2 篇 刘岳
  • 1 篇 erdal ozkaya
  • 1 篇 huang cheng
  • 1 篇 yuhang gao
  • 1 篇 宋宗显
  • 1 篇 vašák petr

语言

  • 71 篇 中文
  • 51 篇 英文
检索条件"主题词=powershell"
122 条 记 录,以下是1-10 订阅
排序:
PowerDetector:Malicious powershell Script Family Classification Based on Multi-Modal Semantic Fusion and Deep Learning
收藏 引用
China Communications 2023年 第11期20卷 202-224页
作者: Xiuzhang Yang Guojun Peng Dongni Zhang Yuhang Gao Chenguang Li School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationWuhan 430072China School of Information Guizhou University of Finance and EconomicsGuiyang 550025China
Power Shell has been widely deployed in fileless malware and advanced persistent threat(APT)attacks due to its high stealthiness and live-off-theland ***,existing works mainly focus on deobfuscation and malicious dete... 详细信息
来源: 评论
Effective method for detecting malicious powershell scripts based on hybrid features
收藏 引用
NEUROCOMPUTING 2021年 448卷 30-39页
作者: Fang, Yong Zhou, Xiangyu Huang, Cheng Sichuan Univ Coll Cybersecur Chengdu Sichuan Peoples R China
At present, network attacks are rampant in the Internet world, and the attack methods of hackers are changing steadily. powershell is a programming language based on the command line *** framework, with powerful funct... 详细信息
来源: 评论
powershell Core for Linux Administrators Cookbook: Use powershell Core 6.x on Linux to automate complex, repetitive, and time-consuming tasks  1
收藏 引用
2018年
作者: Prashanth Jayaram Ram Iyer
Over 150 recipes to leverage Microsoft's open source automation framework and command line shellKey Features• Work effectively on Windows, Linux, and macOS with powershell’s object-oriented approach and capabilit... 详细信息
来源: 评论
powershell-based novel framework for Big health data analysis
收藏 引用
International Journal of Information Technology (Singapore) 2021年 第1期13卷 287-290页
作者: Ren, Wei Wan, Dong Zhu, Huifeng Liu, Fangfang Mirt, Greg Xu, Fan Department of Humanities and Information Management Chengdu Medical College Chengdu 610500 China First Affiliated Hospital of Chongqing Medical University Chongqing 410016 China College of Pharmaceutical Science and Chinese Medicine Southwest University Chongqing 400715 China Southwest Minzu University Chengdu 610500 China Department of Public Health Chengdu Medical College Chengdu 610500 China Neuro Occupational Activity Centre Novo mesto Ljubljana Slovenia
An obvious feature of the big data is overload. When we are held up in the Lake of big data, it is necessary to filter the most meaningful information [Khan et al. (ICCWAMTIP 2018:232–236, 2018), (Int J Inf Technol 1... 详细信息
来源: 评论
powershell Deep Dives
收藏 引用
2013年
作者: Jeffery Hicks ■ Richard Sidd...
SummaryHere's your chance to learn from the best in the business. powershell Deep Dives is a trove of essential techniques, practical guidance, and the expert insights you earn only through years of experience. Ed... 详细信息
来源: 评论
The Power of powershell: Examples of how powershell Scripts can Supplement a Patch Management System to Solve Unusual Problems  17
The Power of PowerShell: Examples of how PowerShell Scripts ...
收藏 引用
45th ACM Annual Conference on SIGUCCS (SIGUCCS)
作者: Palumbo, Timothy Lehigh Univ 8B East Packer Ave Bethlehem PA 18015 USA
Lehigh University currently utilizes the Flexera Corporate Software Inspector (CSI, formerly Secunia CSI) application to patch faculty/staff computers on campus. This system patches third-party applications on all cur... 详细信息
来源: 评论
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for powershell Scripts  19
Effective and Light-Weight Deobfuscation and Semantic-Aware ...
收藏 引用
ACM SIGSAC Conference on Computer and Communications Security (CCS)
作者: Li, Zhenyuan Chen, Qi Alfred Xiong, Chunlin Chen, Yan Zhu, Tiantian Yang, Hai Zhejiang Univ Hangzhou Peoples R China Univ Calif Irvine Irvine CA USA Northwestern Univ Evanston IL 60208 USA Zhejiang Univ Technol Hangzhou Peoples R China MagicShield Inc Oceanside CA USA
In recent years, powershell is increasingly reported to appear in a variety of cyber attacks ranging from advanced persistent threat, ransomware, phishing emails, cryptojacking, financial threats, to fileless attacks.... 详细信息
来源: 评论
Transformer-Based Original Content Recovery from Obfuscated powershell Scripts  29th
Transformer-Based Original Content Recovery from Obfuscated ...
收藏 引用
29th International Conference on Neural Information Processing
作者: Dedeko, Michal Scherer, Rafal Czestochowa Tech Univ Czestochowa Poland
Microsoft powershell is a scripting language and a command-line utility, widely used by professionals to automate tasks and to manage system services. Due to the fact of its prevalence, it was recently seen abused by ... 详细信息
来源: 评论
Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious powershell Detection  17th
Evaluating the Possibility of Evasion Attacks to Machine Lea...
收藏 引用
17th International Conference on Information Security Practice and Experience (ISPEC)
作者: Mezawa, Yuki Mimura, Mamoru Natl Def Acad Japan Yokosuka Kanagawa Japan
In cyber attacks, powershell has become a convenient tool for attackers. A previous study proposed a classification method for powershell scripts that combines natural language processing (NLP) techniques and machine ... 详细信息
来源: 评论
Windows powershell Desired State Configuration Revealed  1st ed.
收藏 引用
丛书名: Books for professionals by professionals;The expert's voice in powershell
2014年
作者: Ravikanth Chaganti
Desired State Configuration (DSC) is a powerful new configuration management platform that makes it easier than ever to perform cross-platform configuration management of your infrastructure, whether on-premise or in ... 详细信息
来源: 评论