CybersecurityPub Date : 2023-08-03DOI: 10.1186/s42400-023-00157-w
Jiaxi Liu, Yun Feng, Xinyu Liu, Jianjun Zhao, Qixu Liu
{"title":"MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network","authors":"Jiaxi Liu, Yun Feng, Xinyu Liu, Jianjun Zhao, Qixu Liu","doi":"10.1186/s42400-023-00157-w","DOIUrl":"https://doi.org/10.1186/s42400-023-00157-w","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"26 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87300801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CybersecurityPub Date : 2023-07-03DOI: 10.1186/s42400-023-00154-z
Zonghao Ying, Bin Wu
{"title":"NBA: defensive distillation for backdoor removal via neural behavior alignment","authors":"Zonghao Ying, Bin Wu","doi":"10.1186/s42400-023-00154-z","DOIUrl":"https://doi.org/10.1186/s42400-023-00154-z","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"45 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73031348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CybersecurityPub Date : 2023-07-02DOI: 10.1186/s42400-023-00148-x
Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma
{"title":"Are our clone detectors good enough? An empirical study of code effects by obfuscation","authors":"Weihao Huang, Guozhu Meng, Chaoyang Lin, Qiucun Yan, Kai Chen, Zhuo Ma","doi":"10.1186/s42400-023-00148-x","DOIUrl":"https://doi.org/10.1186/s42400-023-00148-x","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"100 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85959972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CybersecurityPub Date : 2023-06-02DOI: 10.1186/s42400-023-00147-y
C. Islamy, T. Ahmad, R. Ijtihadie
{"title":"Reversible data hiding based on histogram and prediction error for sharing secret data","authors":"C. Islamy, T. Ahmad, R. Ijtihadie","doi":"10.1186/s42400-023-00147-y","DOIUrl":"https://doi.org/10.1186/s42400-023-00147-y","url":null,"abstract":"","PeriodicalId":36402,"journal":{"name":"Cybersecurity","volume":"40 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76475979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}