Loading…
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
Dong, Shuaike, Li, Menghao, Diao, Wenrui, Liu, Xiangyu, Liu, Jian, Li, Zhou, Xu, Fenghao, Chen, Kai, Wang, XiaoFeng, Zhang, Kehuan
Published in Security and Privacy in Communication Networks (2018)
Published in Security and Privacy in Communication Networks (2018)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
TransNet: Unseen Malware Variants Detection Using Deep Transfer Learning
Rong, Candong, Gou, Gaopeng, Cui, Mingxin, Xiong, Gang, Li, Zhen, Guo, Li
Published in Security and Privacy in Communication Networks (01.01.2020)
Published in Security and Privacy in Communication Networks (01.01.2020)
Get full text
Book Chapter
Loading…
Loading…
ThreatZoom: Hierarchical Neural Network for CVEs to CWEs Classification
Aghaei, Ehsan, Shadid, Waseem, Al-Shaer, Ehab
Published in Security and Privacy in Communication Networks (01.01.2020)
Published in Security and Privacy in Communication Networks (01.01.2020)
Get full text
Book Chapter
Loading…
MisMesh: Security Issues and Challenges in Service Meshes
Hahn, Dalton A., Davidson, Drew, Bardas, Alexandru G.
Published in Security and Privacy in Communication Networks (01.01.2020)
Published in Security and Privacy in Communication Networks (01.01.2020)
Get full text
Book Chapter
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
On the Effectiveness of Behavior-Based Ransomware Detection
Han, Jaehyun, Lin, Zhiqiang, Porter, Donald E.
Published in Security and Privacy in Communication Networks (01.01.2020)
Published in Security and Privacy in Communication Networks (01.01.2020)
Get full text
Book Chapter
Loading…
Loading…