咨询与建议

限定检索结果

文献类型

  • 2 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 工学
    • 1 篇 计算机科学与技术...
    • 1 篇 软件工程

主题

  • 1 篇 resilience
  • 1 篇 adversarial mach...
  • 1 篇 feature extracti...
  • 1 篇 machine learning
  • 1 篇 accuracy
  • 1 篇 cloud computing
  • 1 篇 machine learning...
  • 1 篇 robustness
  • 1 篇 computer viruses
  • 1 篇 telecommunicatio...
  • 1 篇 heuristic algori...

机构

  • 1 篇 department of co...
  • 1 篇 schaol of comput...
  • 1 篇 jubail industria...
  • 1 篇 schaol of comput...

作者

  • 1 篇 george theodorak...
  • 1 篇 al lelah turki
  • 1 篇 turki al lelah
  • 1 篇 theodorakopoulos...
  • 1 篇 anthi eirini
  • 1 篇 eirini anthi
  • 1 篇 amir javed
  • 1 篇 javed amir

语言

  • 2 篇 英文
检索条件"机构=Schaol of Computer Science and Informatics"
2 条 记 录,以下是1-10 订阅
排序:
Detecting the Abuse of Cloud Services for C&C Infrastructure Through Dynamic Analysis and Machine Learning
Detecting the Abuse of Cloud Services for C&C Infrastructure...
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Al Lelah, Turki Theodorakopoulos, George Javed, Amir Anthi, Eirini Schaol of Computer Science and Informatics Cardiff University Cardiff United Kingdom Jubail Industrial College Department of Computer Science and Information Technology Jubail Saudi Arabia
Cybercriminals increasingly abuse cloud and legitimate services (CLS) as covert command and control (C&C) infrastructure to orchestrate malicious operations and evade detection. This paper addresses the critical c... 详细信息
来源: 评论
Detecting the Abuse of Cloud Services for C&C Infrastructure Through Dynamic Analysis and Machine Learning
Detecting the Abuse of Cloud Services for C&C Infrastructure...
收藏 引用
International Symposium on Networks, computers and Communications (ISNCC)
作者: Turki Al Lelah George Theodorakopoulos Amir Javed Eirini Anthi Schaol of Computer Science and Informatics Cardiff University Cardiff UK Department of Computer Science and Information Technology Jubail Industrial College Jubail Saudi Arabia
Cybercriminals increasingly abuse cloud and legitimate services (CLS) as covert command and control (C&C) infrastructure to orchestrate malicious operations and evade detection. This paper addresses the critical c... 详细信息
来源: 评论