Journal of Computer Virology and Hacking Techniques最新文献

筛选
英文 中文
Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation 注:基于人工智能的网络威胁安全防御自动化模糊多模决策支持系统
Journal of Computer Virology and Hacking Techniques Pub Date : 2023-05-29 DOI: 10.1007/s11416-023-00485-y
Feilu Hang, Linjiang Xie, Zhenhong Zhang, Wei Guo, Hanruo Li
{"title":"Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation","authors":"Feilu Hang, Linjiang Xie, Zhenhong Zhang, Wei Guo, Hanruo Li","doi":"10.1007/s11416-023-00485-y","DOIUrl":"https://doi.org/10.1007/s11416-023-00485-y","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135741686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative adversarial networks and image-based malware classification 生成对抗网络和基于图像的恶意软件分类
Journal of Computer Virology and Hacking Techniques Pub Date : 2023-02-13 DOI: 10.1007/s11416-023-00465-2
Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp
{"title":"Generative adversarial networks and image-based malware classification","authors":"Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp","doi":"10.1007/s11416-023-00465-2","DOIUrl":"https://doi.org/10.1007/s11416-023-00465-2","url":null,"abstract":"For efficient malware removal, determination of malware threat levels, and damage estimation, malware family classification plays a critical role. In this paper, we extract features from malware executable files and represent them as images using various approaches. We then focus on generative adversarial networks (GAN) for multiclass classification and compare our GAN results to other popular machine learning techniques, including support vector machine (SVM), XGBoost, and restricted Boltzmann machines (RBM). We find that the AC-GAN discriminator is generally competitive with other machine learning techniques. We also evaluate the utility of the GAN generative model for adversarial attacks on image-based malware detection. While AC-GAN generated images are visually impressive, we find that they are easily distinguished from real malware images using any of several learning techniques. This result indicates that our GAN generated images are of surprisingly little value in adversarial attacks.","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135837732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On post-handshake authentication and external PSKs in TLS 1.3 关于 TLS 1.3 中的握手后验证和外部 PSK
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2020-04-23 DOI: 10.1007/s11416-020-00352-0
L. Akhmetzyanova, E. Alekseev, Ekaterina Smyshlyaeva, A. Sokolov
{"title":"On post-handshake authentication and external PSKs in TLS 1.3","authors":"L. Akhmetzyanova, E. Alekseev, Ekaterina Smyshlyaeva, A. Sokolov","doi":"10.1007/s11416-020-00352-0","DOIUrl":"https://doi.org/10.1007/s11416-020-00352-0","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141210310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparison of the complexity of Diffie–Hellman and discrete logarithm problems Diffie-Hellman 和离散对数问题的复杂性比较
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2020-04-13 DOI: 10.1007/s11416-020-00355-x
M. Cherepniov
{"title":"Comparison of the complexity of Diffie–Hellman and discrete logarithm problems","authors":"M. Cherepniov","doi":"10.1007/s11416-020-00355-x","DOIUrl":"https://doi.org/10.1007/s11416-020-00355-x","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141215518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting flaws in Windbg: how to escape or fool debuggers from existing flaws 利用 Windbg 中的缺陷:如何从现有缺陷中逃脱或愚弄调试器
IF 1.5
Journal of Computer Virology and Hacking Techniques Pub Date : 2020-03-05 DOI: 10.1007/s11416-020-00347-x
François Plumerault, Baptiste David
{"title":"Exploiting flaws in Windbg: how to escape or fool debuggers from existing flaws","authors":"François Plumerault, Baptiste David","doi":"10.1007/s11416-020-00347-x","DOIUrl":"https://doi.org/10.1007/s11416-020-00347-x","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2020-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141224391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信