Angles最新文献

筛选
英文 中文
A framework for supporting ransomware detection and prevention based on hybrid analysis 一种基于混合分析的支持勒索软件检测和预防的框架
Angles Pub Date : 2021-05-24 DOI: 10.1007/s11416-021-00388-w
F. Mercaldo
{"title":"A framework for supporting ransomware detection and prevention based on hybrid analysis","authors":"F. Mercaldo","doi":"10.1007/s11416-021-00388-w","DOIUrl":"https://doi.org/10.1007/s11416-021-00388-w","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"221 - 227"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00388-w","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49078063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes 计算机病毒学的区块链潜力:利用k码组合技术
Angles Pub Date : 2021-05-17 DOI: 10.1007/s11416-021-00389-9
Joanna Moubarak, E. Filiol, M. Chamoun
{"title":"The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes","authors":"Joanna Moubarak, E. Filiol, M. Chamoun","doi":"10.1007/s11416-021-00389-9","DOIUrl":"https://doi.org/10.1007/s11416-021-00389-9","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"199 - 220"},"PeriodicalIF":0.0,"publicationDate":"2021-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00389-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46881562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware detection and classification using community detection and social network analysis 基于社区检测和社会网络分析的恶意软件检测与分类
Angles Pub Date : 2021-05-14 DOI: 10.1007/s11416-021-00387-x
V. Reddy, Naimisha Kolli, Balakrishnan Narayanaswamy
{"title":"Malware detection and classification using community detection and social network analysis","authors":"V. Reddy, Naimisha Kolli, Balakrishnan Narayanaswamy","doi":"10.1007/s11416-021-00387-x","DOIUrl":"https://doi.org/10.1007/s11416-021-00387-x","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"333 - 346"},"PeriodicalIF":0.0,"publicationDate":"2021-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00387-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44858998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel method for malware detection based on hardware events using deep neural networks 一种基于硬件事件的深度神经网络恶意软件检测新方法
Angles Pub Date : 2021-05-08 DOI: 10.1007/s11416-021-00386-y
Hadis Ghanei, F. Manavi, A. Hamzeh
{"title":"A novel method for malware detection based on hardware events using deep neural networks","authors":"Hadis Ghanei, F. Manavi, A. Hamzeh","doi":"10.1007/s11416-021-00386-y","DOIUrl":"https://doi.org/10.1007/s11416-021-00386-y","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"319 - 331"},"PeriodicalIF":0.0,"publicationDate":"2021-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00386-y","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46040574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Signature-less ransomware detection and mitigation 无签名勒索软件检测和缓解
Angles Pub Date : 2021-05-04 DOI: 10.1007/s11416-021-00384-0
Yash Shashikant Joshi, Harsh Mahajan, Sumedh Nitin Joshi, Kshitij Pradeep Gupta, A. Agarkar
{"title":"Signature-less ransomware detection and mitigation","authors":"Yash Shashikant Joshi, Harsh Mahajan, Sumedh Nitin Joshi, Kshitij Pradeep Gupta, A. Agarkar","doi":"10.1007/s11416-021-00384-0","DOIUrl":"https://doi.org/10.1007/s11416-021-00384-0","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"299 - 306"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00384-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42408296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Android malware classification using convolutional neural network and LSTM 使用卷积神经网络和LSTM的Android恶意软件分类
Angles Pub Date : 2021-04-29 DOI: 10.1007/s11416-021-00385-z
Soodeh Hosseini, Ali Emamali Nezhad, Hossein Seilani
{"title":"Android malware classification using convolutional neural network and LSTM","authors":"Soodeh Hosseini, Ali Emamali Nezhad, Hossein Seilani","doi":"10.1007/s11416-021-00385-z","DOIUrl":"https://doi.org/10.1007/s11416-021-00385-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"307 - 318"},"PeriodicalIF":0.0,"publicationDate":"2021-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00385-z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43174446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Markhor: malware detection using fuzzy similarity of system call dependency sequences Markhor:利用系统调用依赖序列的模糊相似性进行恶意软件检测
Angles Pub Date : 2021-04-26 DOI: 10.1007/s11416-021-00383-1
Amir Mohammadzade Lajevardi, Saeed Parsa, Mohammad Javad Amiri
{"title":"Markhor: malware detection using fuzzy similarity of system call dependency sequences","authors":"Amir Mohammadzade Lajevardi, Saeed Parsa, Mohammad Javad Amiri","doi":"10.1007/s11416-021-00383-1","DOIUrl":"https://doi.org/10.1007/s11416-021-00383-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"81 - 90"},"PeriodicalIF":0.0,"publicationDate":"2021-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00383-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48123731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On delegatability of MDVS schemes 关于MDVS方案的可删除性
Angles Pub Date : 2021-04-13 DOI: 10.1007/s11416-021-00382-2
P. Rastegari, W. Susilo
{"title":"On delegatability of MDVS schemes","authors":"P. Rastegari, W. Susilo","doi":"10.1007/s11416-021-00382-2","DOIUrl":"https://doi.org/10.1007/s11416-021-00382-2","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"71 - 80"},"PeriodicalIF":0.0,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00382-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46393471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data augmentation and transfer learning to classify malware images in a deep learning context 在深度学习环境中对恶意软件图像进行分类的数据增强和迁移学习
Angles Pub Date : 2021-04-08 DOI: 10.1007/s11416-021-00381-3
Niccolò Marastoni, R. Giacobazzi, Mila Dalla Preda
{"title":"Data augmentation and transfer learning to classify malware images in a deep learning context","authors":"Niccolò Marastoni, R. Giacobazzi, Mila Dalla Preda","doi":"10.1007/s11416-021-00381-3","DOIUrl":"https://doi.org/10.1007/s11416-021-00381-3","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"279 - 297"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00381-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43779087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Understanding Linux kernel vulnerabilities 了解Linux内核漏洞
Angles Pub Date : 2021-04-04 DOI: 10.1007/s11416-021-00379-x
Alireza Shameli-Sendi
{"title":"Understanding Linux kernel vulnerabilities","authors":"Alireza Shameli-Sendi","doi":"10.1007/s11416-021-00379-x","DOIUrl":"https://doi.org/10.1007/s11416-021-00379-x","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"17 1","pages":"265 - 278"},"PeriodicalIF":0.0,"publicationDate":"2021-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11416-021-00379-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43488290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信