Angles最新文献

筛选
英文 中文
Persistent MobileApp-in-the-Middle (MAitM) attack 持续移动应用程序-中间(MAitM)攻击
Angles Pub Date : 2023-06-30 DOI: 10.1007/s11416-023-00484-z
C. Catalano, F. Tommasi
{"title":"Persistent MobileApp-in-the-Middle (MAitM) attack","authors":"C. Catalano, F. Tommasi","doi":"10.1007/s11416-023-00484-z","DOIUrl":"https://doi.org/10.1007/s11416-023-00484-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41611631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Full round impossible differentials for Feistel ciphers 费斯特尔密码的全圆不可能微分
Angles Pub Date : 2023-06-24 DOI: 10.1007/s11416-023-00488-9
D. Zakharov, M. Pudovkina
{"title":"Full round impossible differentials for Feistel ciphers","authors":"D. Zakharov, M. Pudovkina","doi":"10.1007/s11416-023-00488-9","DOIUrl":"https://doi.org/10.1007/s11416-023-00488-9","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42893657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM 注:使用基于mbgwo的混合LSTM对基于签名和NetFlow的网络蠕虫进行联合检测和分类
Angles Pub Date : 2023-06-20 DOI: 10.1007/s11416-023-00487-w
M. V. Rao, Divya Midhunchakkaravarthy, Sujatha Dandu
{"title":"Retraction Note: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM","authors":"M. V. Rao, Divya Midhunchakkaravarthy, Sujatha Dandu","doi":"10.1007/s11416-023-00487-w","DOIUrl":"https://doi.org/10.1007/s11416-023-00487-w","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44925043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Potential cyber threats of adversarial attacks on autonomous driving models 自动驾驶模型对抗性攻击的潜在网络威胁
Angles Pub Date : 2023-06-05 DOI: 10.1007/s11416-023-00486-x
Eldar Boltachev
{"title":"Potential cyber threats of adversarial attacks on autonomous driving models","authors":"Eldar Boltachev","doi":"10.1007/s11416-023-00486-x","DOIUrl":"https://doi.org/10.1007/s11416-023-00486-x","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42917547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
iOS mobile malware analysis: a state-of-the-art iOS移动恶意软件分析:最先进的技术
Angles Pub Date : 2023-05-18 DOI: 10.1007/s11416-023-00477-y
Madihah Mohd Saudi, M. A. Husainiamer, Azuan Ahmad, Moh Yamani Idna Idris
{"title":"iOS mobile malware analysis: a state-of-the-art","authors":"Madihah Mohd Saudi, M. A. Husainiamer, Azuan Ahmad, Moh Yamani Idna Idris","doi":"10.1007/s11416-023-00477-y","DOIUrl":"https://doi.org/10.1007/s11416-023-00477-y","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"1 1","pages":"1 - 30"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44821465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Historical notes on Russian cryptography 俄国密码学的历史注释
Angles Pub Date : 2023-05-15 DOI: 10.1007/s11416-023-00481-2
A. Epishkina, S. Zapechnikov, A. Belozubova
{"title":"Historical notes on Russian cryptography","authors":"A. Epishkina, S. Zapechnikov, A. Belozubova","doi":"10.1007/s11416-023-00481-2","DOIUrl":"https://doi.org/10.1007/s11416-023-00481-2","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42658227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forecasting of digital financial crimes in Russia based on machine learning methods 基于机器学习方法的俄罗斯数字金融犯罪预测
Angles Pub Date : 2023-05-04 DOI: 10.1007/s11416-023-00480-3
V. Ivanyuk
{"title":"Forecasting of digital financial crimes in Russia based on machine learning methods","authors":"V. Ivanyuk","doi":"10.1007/s11416-023-00480-3","DOIUrl":"https://doi.org/10.1007/s11416-023-00480-3","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"1 1","pages":"1 - 14"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42003722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware 利用引发恶意行为的技术来促进和自动化物联网恶意软件分析的沙盒的设计和实现:剖析物联网恶意程序功能的案例研究
Angles Pub Date : 2023-05-02 DOI: 10.1007/s11416-023-00478-x
Shun Yonamine, Yuzo Taenaka, Y. Kadobayashi, Daisuke Miyamoto
{"title":"Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware","authors":"Shun Yonamine, Yuzo Taenaka, Y. Kadobayashi, Daisuke Miyamoto","doi":"10.1007/s11416-023-00478-x","DOIUrl":"https://doi.org/10.1007/s11416-023-00478-x","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"149 - 163"},"PeriodicalIF":0.0,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42583488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of tor malware and onion services tor恶意软件和洋葱服务的识别
Angles Pub Date : 2023-04-29 DOI: 10.1007/s11416-023-00476-z
J. Bergman, O. Popov
{"title":"Recognition of tor malware and onion services","authors":"J. Bergman, O. Popov","doi":"10.1007/s11416-023-00476-z","DOIUrl":"https://doi.org/10.1007/s11416-023-00476-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48125193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An algorithm for scheduling of threads for system and application code split approach in dynamic malware analysis 一种系统线程调度算法和动态恶意软件分析中的应用程序代码分割方法
Angles Pub Date : 2023-04-05 DOI: 10.1007/s11416-023-00473-2
Anastasia Pereberina, Alexey Kostyushko, A. Tormasov
{"title":"An algorithm for scheduling of threads for system and application code split approach in dynamic malware analysis","authors":"Anastasia Pereberina, Alexey Kostyushko, A. Tormasov","doi":"10.1007/s11416-023-00473-2","DOIUrl":"https://doi.org/10.1007/s11416-023-00473-2","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"459 - 468"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43857243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信