Angles最新文献

筛选
英文 中文
ConRec: malware classification using convolutional recurrence ConRec:使用卷积递归的恶意软件分类
Angles Pub Date : 2022-02-09 DOI: 10.1007/s11416-022-00416-3
Abhishek Mallik, Anavi Khetarpal, S. Kumar
{"title":"ConRec: malware classification using convolutional recurrence","authors":"Abhishek Mallik, Anavi Khetarpal, S. Kumar","doi":"10.1007/s11416-022-00416-3","DOIUrl":"https://doi.org/10.1007/s11416-022-00416-3","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"297 - 313"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48116672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
PEzoNG: Advanced Packer For Automated Evasion On Windows PEzoNG: Windows上自动逃避的高级打包器
Angles Pub Date : 2022-02-07 DOI: 10.1007/s11416-022-00417-2
G. Bernardinetti, Dimitri Di Cristofaro, G. Bianchi
{"title":"PEzoNG: Advanced Packer For Automated Evasion On Windows","authors":"G. Bernardinetti, Dimitri Di Cristofaro, G. Bianchi","doi":"10.1007/s11416-022-00417-2","DOIUrl":"https://doi.org/10.1007/s11416-022-00417-2","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"315 - 331"},"PeriodicalIF":0.0,"publicationDate":"2022-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47067223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel approach for ransomware detection based on PE header using graph embedding 一种新的基于PE头的图嵌入勒索软件检测方法
Angles Pub Date : 2022-01-18 DOI: 10.1007/s11416-021-00414-x
F. Manavi, A. Hamzeh
{"title":"A novel approach for ransomware detection based on PE header using graph embedding","authors":"F. Manavi, A. Hamzeh","doi":"10.1007/s11416-021-00414-x","DOIUrl":"https://doi.org/10.1007/s11416-021-00414-x","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"285 - 296"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43602757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An efficient IDS in cloud environment using feature selection based on DM algorithm 基于DM算法的特征选择实现了云环境下的高效入侵检测
Angles Pub Date : 2022-01-13 DOI: 10.1007/s11416-021-00410-1
Partha Ghosh, Shashwat Sinha, R. Sharma, S. Phadikar
{"title":"An efficient IDS in cloud environment using feature selection based on DM algorithm","authors":"Partha Ghosh, Shashwat Sinha, R. Sharma, S. Phadikar","doi":"10.1007/s11416-021-00410-1","DOIUrl":"https://doi.org/10.1007/s11416-021-00410-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"243 - 258"},"PeriodicalIF":0.0,"publicationDate":"2022-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52705000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An approach to dynamic malware analysis based on system and application code split 一种基于系统和应用代码分割的动态恶意软件分析方法
Angles Pub Date : 2022-01-13 DOI: 10.1007/s11416-021-00412-z
Anastasia Pereberina, Alexey Kostyushko, A. Tormasov
{"title":"An approach to dynamic malware analysis based on system and application code split","authors":"Anastasia Pereberina, Alexey Kostyushko, A. Tormasov","doi":"10.1007/s11416-021-00412-z","DOIUrl":"https://doi.org/10.1007/s11416-021-00412-z","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"231 - 241"},"PeriodicalIF":0.0,"publicationDate":"2022-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52704879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
About long period sequences 关于长周期序列
Angles Pub Date : 2021-11-30 DOI: 10.1007/s11416-021-00408-9
V. Fomichev
{"title":"About long period sequences","authors":"V. Fomichev","doi":"10.1007/s11416-021-00408-9","DOIUrl":"https://doi.org/10.1007/s11416-021-00408-9","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"205 - 213"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48751154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the impossibility of an invariant attack on Kuznyechik 关于不可能对库兹涅奇克进行永久攻击
Angles Pub Date : 2021-11-29 DOI: 10.1007/s11416-021-00411-0
Denis Fomin
{"title":"On the impossibility of an invariant attack on Kuznyechik","authors":"Denis Fomin","doi":"10.1007/s11416-021-00411-0","DOIUrl":"https://doi.org/10.1007/s11416-021-00411-0","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"61 - 67"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52705016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
2Faces: a new model of malware based on dynamic compiling and reflection 2Faces:一种基于动态编译和反射的新型恶意软件模型
Angles Pub Date : 2021-11-15 DOI: 10.1007/s11416-021-00409-8
Rosangela Casolare, G. Lacava, F. Martinelli, F. Mercaldo, Marco Russodivito, A. Santone
{"title":"2Faces: a new model of malware based on dynamic compiling and reflection","authors":"Rosangela Casolare, G. Lacava, F. Martinelli, F. Mercaldo, Marco Russodivito, A. Santone","doi":"10.1007/s11416-021-00409-8","DOIUrl":"https://doi.org/10.1007/s11416-021-00409-8","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"215 - 230"},"PeriodicalIF":0.0,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46578357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data integrity algorithm based on additive generators and hash function 基于加性生成器和哈希函数的数据完整性算法
Angles Pub Date : 2021-11-09 DOI: 10.1007/s11416-021-00405-y
V. Fomichev, D. Bobrovskiy, A. Koreneva, T. Nabiev, Dmitry Zadorozhny
{"title":"Data integrity algorithm based on additive generators and hash function","authors":"V. Fomichev, D. Bobrovskiy, A. Koreneva, T. Nabiev, Dmitry Zadorozhny","doi":"10.1007/s11416-021-00405-y","DOIUrl":"https://doi.org/10.1007/s11416-021-00405-y","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"31 1","pages":"31 - 41"},"PeriodicalIF":0.0,"publicationDate":"2021-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52704946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the comparison of methods for asymmetric execution of cryptographic primitives and protocols in the context of using small parameters and short keys 小参数短密钥环境下密码原语与协议的非对称执行方法比较
Angles Pub Date : 2021-10-31 DOI: 10.1007/s11416-021-00407-w
Alexander A. Varfolomeev
{"title":"On the comparison of methods for asymmetric execution of cryptographic primitives and protocols in the context of using small parameters and short keys","authors":"Alexander A. Varfolomeev","doi":"10.1007/s11416-021-00407-w","DOIUrl":"https://doi.org/10.1007/s11416-021-00407-w","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"43 - 47"},"PeriodicalIF":0.0,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48347754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信