Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Blackhole attack: user identity and password seize attack using honeypot
Mun, Hyung-Jin, Han, Kun-Hee
Published in Journal of computer virology and hacking techniques (01.08.2016)
Published in Journal of computer virology and hacking techniques (01.08.2016)
Get full text
Journal Article
Analysis of ResNet and GoogleNet models for malware detection
Khan, Riaz Ullah, Zhang, Xiaosong, Kumar, Rajesh
Published in Journal of Computer Virology and Hacking Techniques (11.03.2019)
Published in Journal of Computer Virology and Hacking Techniques (11.03.2019)
Get full text
Journal Article
Deciphering malware’s use of TLS (without decryption)
Anderson, Blake, Paul, Subharthi, McGrew, David
Published in Journal of Computer Virology and Hacking Techniques (01.08.2018)
Published in Journal of Computer Virology and Hacking Techniques (01.08.2018)
Get full text
Journal Article
An investigation of byte n-gram features for malware classification
Raff, Edward, Zak, Richard, Cox, Russell, Sylvester, Jared, Yacci, Paul, Ward, Rebecca, Tracy, Anna, McLean, Mark, Nicholas, Charles
Published in Journal of Computer Virology and Hacking Techniques (01.02.2018)
Published in Journal of Computer Virology and Hacking Techniques (01.02.2018)
Get full text
Journal Article
Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends
Pleshakova, Ekaterina, Osipov, Aleksey, Gataullin, Sergey, Gataullin, Timur, Vasilakos, Athanasios
Published in Journal of Computer Virology and Hacking Techniques (01.09.2024)
Published in Journal of Computer Virology and Hacking Techniques (01.09.2024)
Get full text
Journal Article
Deep learning for image-based mobile malware detection
Mercaldo, Francesco, Santone, Antonella
Published in Journal of Computer Virology and Hacking Techniques (01.06.2020)
Published in Journal of Computer Virology and Hacking Techniques (01.06.2020)
Get full text
Journal Article
Security intrusion detection using quantum machine learning techniques
Kalinin, Maxim, Krundyshev, Vasiliy
Published in Journal of Computer Virology and Hacking Techniques (01.03.2023)
Published in Journal of Computer Virology and Hacking Techniques (01.03.2023)
Get full text
Journal Article
ConRec: malware classification using convolutional recurrence
Mallik, Abhishek, Khetarpal, Anavi, Kumar, Sanjay
Published in Journal of Computer Virology and Hacking Techniques (01.12.2022)
Published in Journal of Computer Virology and Hacking Techniques (01.12.2022)
Get full text
Journal Article
A novel approach for ransomware detection based on PE header using graph embedding
Manavi, Farnoush, Hamzeh, Ali
Published in Journal of Computer Virology and Hacking Techniques (01.12.2022)
Published in Journal of Computer Virology and Hacking Techniques (01.12.2022)
Get full text
Journal Article
Visual malware detection using local malicious pattern
Hashemi, Hashem, Hamzeh, Ali
Published in Journal of Computer Virology and Hacking Techniques (11.03.2019)
Published in Journal of Computer Virology and Hacking Techniques (11.03.2019)
Get full text
Journal Article
Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo
Kale, Aparna Sunil, Pandya, Vinay, Di Troia, Fabio, Stamp, Mark
Published in Journal of Computer Virology and Hacking Techniques (01.03.2023)
Published in Journal of Computer Virology and Hacking Techniques (01.03.2023)
Get full text
Journal Article
Machine learning methods for speech emotion recognition on telecommunication systems: Machine learning methods for speech emotion recognition on telecommunication systems
Osipov, Alexey, Pleshakova, Ekaterina, Liu, Yang, Gataullin, Sergey
Published in Journal of Computer Virology and Hacking Techniques (01.09.2024)
Published in Journal of Computer Virology and Hacking Techniques (01.09.2024)
Get full text
Journal Article