-
1Academic Journal
المؤلفون: WANG Jinwei, CHEN Zhengjia, XIE Xue, LUO Xiangyang, MA Bin
المصدر: Tongxin xuebao, Vol 45, Pp 160-175 (2024)
مصطلحات موضوعية: deep learning, data visualization, malicious code detection and classification, Telecommunication, TK5101-6720
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1000-436X
-
2Academic Journal
المؤلفون: Candra Ahmadi, Jiann-Liang Chen, Yi-Cheng Lai
المصدر: IEEE Access, Vol 12, Pp 71746-71760 (2024)
مصطلحات موضوعية: Cybersecurity, malicious code detection, natural language processing (NLP), office documents security, P-code analysis, visual basic for applications (VBA), Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
3Academic Journal
المصدر: IEEE Access, Vol 12, Pp 118295-118314 (2024)
مصطلحات موضوعية: Cyber attacks, log poisoning, log injection, Internet of Things (IoT), malicious code, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
4Academic Journal
المصدر: IEEE Access, Vol 12, Pp 147400-147421 (2024)
مصطلحات موضوعية: Boosting, classifier ensemble, feature selection, genetic algorithms, malicious code, N-gram analysis, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
5Academic Journal
المصدر: 网络与信息安全学报, Vol 9, Iss 4, Pp 90-103 (2023)
مصطلحات موضوعية: federated learning, model, model similarity, malicious code, detection, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
6Academic Journal
المصدر: Journal of Industrial Engineering and Applied Science, 2(1), 8-12, (2024-02-12)
مصطلحات موضوعية: Machine Learning, Cyberspace security, Network Intrusion Detection, Malicious Code Identification, Threat Intelligence Analysis
Relation: https://doi.org/10.5281/zenodo.10521642; https://doi.org/10.5281/zenodo.10521643; oai:zenodo.org:10521643; https://www.suaspress.org/ojs/index.php/JIEAS/article/view/v2n1a02
-
7
-
8
المؤلفون: Correia, Miguel Luís Pereira
مصطلحات موضوعية: Supply chain, Anomaly detection, Repositories, Malicious code, Support vector machines, Simulations
وصف الملف: application/pdf
الاتاحة: http://hdl.handle.net/10773/38716
-
9Academic Journal
المؤلفون: Lalitha Chembeti, Kudipudi Harinadha Baba, Jagadeesh N, Siva Prasad Reddy P, Keerthana S, Amrin Taj SK, Hima Prathyusha T
مصطلحات موضوعية: Helminths have been intestinal parasites, which are the most typical bacterial infections. Like living beings through emerging economies, they usually generate a worldwide disease burden a certain outstrips better-known circumstances, including malaria and tuberculosis. Anthelmintics are the drug used to eliminate and live this same variety of intestinal parasitic parasite organisms from the gastrointestinal and epithelium like humans and other mammals. These same anthelminthic actions like hydroethanolic leaf extract like Hymenocallis malicious code to alter computers have been analyzed through elderly Indian earthworms (peridia post human). This ended up finding that now the hydroethanolic extricate like Hymenocallis malicious code to change the laptop decided to show anthelminthic actions at an intensity like 20mg/ml, 40mg/ml, and 80mg/ml of each. This same compared with the standard had been Albendazole (20 mg/ml)
Relation: https://doi.org/10.26452/fjphs.v3i3.473; oai:zenodo.org:8248313
-
10Academic Journal
المؤلفون: Dragan Z. Damjanović
المصدر: Vojnotehnički Glasnik, Vol 70, Iss 3, Pp 734-755 (2022)
مصطلحات موضوعية: malicious code, cloud, malware, intelligence, Military Science, Engineering (General). Civil engineering (General), TA1-2040
وصف الملف: electronic resource
-
11Academic Journal
المؤلفون: Xiaoqiang Tang, Bingzhe He
المصدر: Energy Reports, Vol 8, Iss , Pp 1424-1435 (2022)
مصطلحات موضوعية: Reinforcement learning, Malicious code, Dynamic traffic, Camouflage detection, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
12Academic Journal
المؤلفون: SUN, Tiezhu, ALLIX, Kevin, KIM, Kisub, Zhou, Xin, KIM, Dongsun, Lo, David, Bissyande, Tegawende F., KLEIN, Jacques
المصدر: IEEE Transactions on Software Engineering, 49 (10), 4691 - 4706 (2023-09-01)
مصطلحات موضوعية: Android app analysis, code representation, defect prediction, malicious code localization, Representation learning, Android apps, Code, Localisation, Location awareness, Malicious codes, Malwares, Predictive models, Task analysis, Software, Engineering, computing & technology, Computer science, Ingénierie, informatique & technologie, Sciences informatiques
Relation: http://xplorestaging.ieee.org/ielx7/32/10286436/10237047.pdf?arnumber=10237047; AFR PhD Project number 17046335; urn:issn:0098-5589; urn:issn:1939-3520; https://orbilu.uni.lu/handle/10993/57618; info:hdl:10993/57618
-
13Academic Journal
المؤلفون: Hong Huang, Rui Du, Zhaolian Wang, Xin Li, Guotao Yuan
المصدر: Sensors; Volume 23; Issue 16; Pages: 7084
مصطلحات موضوعية: deep learning, malicious code detection, neural networks, attention mechanism, data augmentation, CoAtNet model
وصف الملف: application/pdf
Relation: Sensor Networks; https://dx.doi.org/10.3390/s23167084
الاتاحة: https://doi.org/10.3390/s23167084
-
14Academic Journal
المؤلفون: Haitham Ameen Noman, Osama M. F. Abu-Sharkh
المصدر: Sensors; Volume 23; Issue 13; Pages: 6067
مصطلحات موضوعية: attacks, code injection, cybersecurity, IMECA, Internet of Things, malicious code, wireless networks
وصف الملف: application/pdf
Relation: Internet of Things; https://dx.doi.org/10.3390/s23136067
الاتاحة: https://doi.org/10.3390/s23136067
-
15Academic Journal
المؤلفون: Kyungroul Lee, Jaehyuk Lee, Sun-Young Lee, Kangbin Yim
المصدر: Sensors; Volume 23; Issue 6; Pages: 3023
مصطلحات موضوعية: cloud service, entropy, malicious code, ransomware
وصف الملف: application/pdf
Relation: https://dx.doi.org/10.3390/s23063023
الاتاحة: https://doi.org/10.3390/s23063023
-
16Academic Journal
المؤلفون: Kyungroul Lee, Jaehyuk Lee, Kangbin Yim
المصدر: Applied Sciences; Volume 13; Issue 5; Pages: 2894
مصطلحات موضوعية: malicious code, detection technique, attack scenario, attack technique, APT attack
جغرافية الموضوع: agris
وصف الملف: application/pdf
Relation: Computing and Artificial Intelligence; https://dx.doi.org/10.3390/app13052894
الاتاحة: https://doi.org/10.3390/app13052894
-
17Academic Journal
المصدر: 网络与信息安全学报, Vol 7, Iss 4, Pp 154-163 (2021)
مصطلحات موضوعية: auto forensics, deep learning, full connected network, malicious code fragment, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
18Academic Journal
المؤلفون: Haojun Wang, Haixia Long, Ailan Wang, Tianyue Liu, Haiyan Fu
المصدر: IEEE Access, Vol 9, Pp 91512-91523 (2021)
مصطلحات موضوعية: Malicious code classification, deep learning, convolutional neural networks, N-gram, regularization algorithm, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
19Academic Journal
المؤلفون: ESLAVATH, RAVI
المصدر: Journal of Theoretical and Applied Information Technology, 100(20), 6117-6129, (2022-10-31)
مصطلحات موضوعية: Malicious Code Detection, Malware Detection, Machine Learning, Deep Learning, Malware Detection Optimization
Relation: https://doi.org/10.5281/zenodo.10475510; https://doi.org/10.5281/zenodo.10475511; oai:zenodo.org:10475511
-
20Academic Journal
المؤلفون: Kuppa, Koundinya, Dayal, Anushka, Gupta, Shashank, Dua, Amit, Chaudhary, Pooja, Rathore, Shailendra
المصدر: Kuppa , K , Dayal , A , Gupta , S , Dua , A , Chaudhary , P & Rathore , S 2022 , ' ConvXSS : a deep learning-based smart ICT framework against code injection attacks for HTML5 web applications in sustainable smart city infrastructure ' , Sustainable Cities and Society , vol. 80 , 103765 . https://doi.org/10.1016/j.scs.2022.103765
مصطلحات موضوعية: Sustainable smart cities, Security, Privacy, ICT, CPS, Web security, Deep learning, Data preprocessing, Training and testing, Neural Networks, Sanitization, CNN, XSS attack, Malicious code, Code injection attack
وصف الملف: application/pdf