-
1Report
المؤلفون: Menelet, Alain, Bichot, Charles-Edmond
المساهمون: Armée de l'air et de l'espace, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS), École Centrale de Lyon (ECL), Université de Lyon, Graphes, AlgOrithmes et AppLications (GOAL), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL)
المصدر: https://hal.science/hal-03192097 ; 2021.
مصطلحات موضوعية: malware, malware detection, malware characterization, malware families, android, static analysis, opcodes, subgraph isomorphism, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/2104.03586; hal-03192097; https://hal.science/hal-03192097; https://hal.science/hal-03192097/document; https://hal.science/hal-03192097/file/Android_malware_detection.pdf; ARXIV: 2104.03586
-
2Academic Journal
المؤلفون: YANG, Xinli, LO, David, LI, Li, XIA, Xin, BISSYANDE, Tegawendé F., KLEIN, Jacques
المصدر: Research Collection School Of Computing and Information Systems
مصطلحات موضوعية: Malware characterization, Topic-specific, Data flow signature, Empirical study, Information Security, Numerical Analysis and Scientific Computing, Software Engineering
وصف الملف: application/pdf
Relation: https://ink.library.smu.edu.sg/sis_research/3675; https://ink.library.smu.edu.sg/context/sis_research/article/4677/viewcontent/1_s20_S095058491730366X_main.pdf
-
3Academic Journal
المؤلفون: BOCCHI, ENRICO, GRIMAUDO, LUIGI, MELLIA, Marco, BARALIS, ELENA MARIA, Saha, Sabyasachi, Miskovic, Stanislav, Modelo Howard, Gaspar, Lee, Sung Ju
المساهمون: Bocchi, Enrico, Grimaudo, Luigi, Mellia, Marco, Baralis, ELENA MARIA, Saha, Sabyasachi, Miskovic, Stanislav, Modelo Howard, Gaspar, Lee, Sung Ju
مصطلحات موضوعية: Automatic classification, Graph network, Malicious behaviors detection, Malware characterization, Network traffic modeling, Computer Networks and Communications
وصف الملف: STAMPA
Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:000388546500003; volume:109; firstpage:142; lastpage:156; numberofpages:15; journal:COMPUTER NETWORKS; http://hdl.handle.net/11583/2655007; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85006186596; http://www.journals.elsevier.com/computer-networks/; http://www.sciencedirect.com/science/article/pii/S1389128616300949
-
4Dissertation/ Thesis
المؤلفون: Khan, Muhammad Salman
المساهمون: McLeod, Robert (Electrical and Computer Engineering) Kinsner, Witold (Electrical and Computer Engineering) Goertzen, Andrew (Physics and Astronomy) Wang, Yingxu (Electrical and Computer Engineering, University of Calgary), Ferens, Ken (Electrical and Computer Engineering)
مصطلحات موضوعية: Fractals, Malware mutation, Anomaly detection, Clustering, Unsupervised machine learning, Malware characterization framework, Endpoint threat detection, EDR, Endpoint detection and response, Microsoft Windows, Process tree, Polymorphism, Metamorphism, Class imbalance, Class inseparability, Variance fractal dimension, Correlation fractal dimension, Information fractal dimension, Spectral fractal dimension, Graph theory, Time graphs, Cognitive machine intelligence, Cognitive computing, Cyber kill chain, Cognitive and concurrent cyber kill chain, Semantic analysis, Features, Attributes, k-means, fBm
وصف الملف: application/pdf
Relation: Muhammad Salman Khan, Ken Ferens, & Witold Kinsner, (2015) “A cognitive multifractal approach to characterize complexity of non-stationary and malicious DNS data traffic using adaptive sliding window”, in proceedings of IEEE 14th Intl. Conf. Cognitive Informatics & Cognitive Computing (ICCI*CC15), Beijing, China, 2015. (doi:10.1109/icci-cc.2015.7259368).; Muhammad Salman Khan, Ken Ferens, & Witold Kinsner, (2015) “A polyscale autonomous sliding window for cognitive machine classification of malicious Internet traffic”, in proceedings of 14th International Conference on Security and Management (SAM'15), WorldComp 2015, Las Vegas, USA, 2015.; Muhammad Salman Khan, Sana Siddiqui, Ken Ferens, & Witold Kinsner, (2016) "Spectral Fractal Dimension Trajectory (SFDT) to measure complexity of malicious attacks”, in proceedings of the International Conference on Security and Management (SAM’16), WorldComp 2016, Las Vegas, USA, 2016.; Muhammad Salman Khan, Ken Ferens, & Witold Kinsner, (2015) “Multifractal singularity spectrum for cognitive cyber defence in Internet time series”, in International Journal of Software Science and Computational Intelligence (IJSSCI), 2015 (doi:10.4018/IJSSCI.2015070102).; Muhammad Salman Khan, Sana Siddiqui Robert D. McLeod, Ken Ferens, & Witold Kinsner, (2016) "Fractal based adaptive boosting algorithm for cognitive detection of computer malware”, in proceedings of 15th IEEE International Conference on Cognitive Informatics and Cognitive Computing (IEEE ICCI*CC 2016), Stanford University, USA. (doi:10.1109/ICCI-CC.2016.7862074).; Muhammad Salman Khan, Sana Siddiqui, Ken Ferens, “Cognitive modeling of polymorphic malwares using fractal based semantic characterization”, in proceedings of IEEE 2017 International Conference on Technologies for Homeland Security (HST), pp. 1-7, April 2017, Waltham, MA, USA. (doi:10.1109/THS.2017.7943487).; Sana Siddiqui, Muhammad Salman Khan, Ken Ferens, & Witold Kinsner, “Fractal based cognitive neural network to detect obfuscated and indistinguishable Internet threats”, in proceedings of the 16th IEEE International Conference on Cognitive Informatics and Cognitive Computing (IEEE ICCI*CC 2017), July 2017, University of Oxford, UK.; Sana Siddiqui, Muhammad Salman Khan, Ken Ferens, “Cognitive computing and multiscale analysis for cyber security” in Computer and Network Security Essentials Book, pp. 507-519, Ed. Kevin Daimi, Springer, 2017. (doi:10.1007/978-3-319-58424-9_29).; Muhammad Salman Khan, Sana Siddiqui, Ken Ferens, “A cognitive and concurrent cyber kill chain model” in Computer and Network Security Essentials Book, pp. 585-602, Ed. Kevin Daimi, Springer, 2017. (doi:10.1007/978-3-319-58424-9_34).; http://hdl.handle.net/1993/33600
الاتاحة: http://hdl.handle.net/1993/33600
-
5
المؤلفون: Enrico Bocchi, Gaspar Modelo-Howard, Luigi Grimaudo, Elena Baralis, Stanislav Miskovic, Sung-Ju Lee, Sabyasachi Saha, Marco Mellia
المساهمون: Politecnico di Torino = Polytechnic of Turin (Polito), Laboratory of Information, Network and Communication Sciences (LINCS), Université Pierre et Marie Curie - Paris 6 (UPMC)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut Mines-Télécom [Paris] (IMT), Réseaux, Mobilité et Services (RMS), Laboratoire Traitement et Communication de l'Information (LTCI), Institut Mines-Télécom [Paris] (IMT)-Télécom Paris-Institut Mines-Télécom [Paris] (IMT)-Télécom Paris, Département Informatique et Réseaux (INFRES), Télécom ParisTech, Symantec Corporation, Department of Computer Science [KAIST] (CS), Korea Advanced Institute of Science and Technology (KAIST)
المصدر: Computer Networks "Special issue on Traffic and Performance in the Big Data Era"
Computer Networks "Special issue on Traffic and Performance in the Big Data Era", 2016, ⟨10.1016/j.comnet.2016.03.021⟩مصطلحات موضوعية: Malware characterization, Computer science, Computer Networks and Communications, Network traffic modeling, Big data, 02 engineering and technology, computer.software_genre, Oracle, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], Robustness (computer science), 020204 information systems, 0202 electrical engineering, electronic engineering, information engineering, False positive paradox, business.industry, Malicious behaviors detection, Malware, 020201 artificial intelligence & image processing, The Internet, Graph networks, Automatic classification, Data mining, business, Communications protocol, computer, Classifier (UML)
-
6Electronic Resource
المؤلفون: McLeod, Robert (Electrical and Computer Engineering) Kinsner, Witold (Electrical and Computer Engineering) Goertzen, Andrew (Physics and Astronomy) Wang, Yingxu (Electrical and Computer Engineering, University of Calgary), Ferens, Ken (Electrical and Computer Engineering), Khan, Muhammad Salman
مصطلحات الفهرس: Fractals, Malware mutation, Anomaly detection, Clustering, Unsupervised machine learning, Malware characterization framework, Endpoint threat detection, EDR, Endpoint detection and response, Microsoft Windows, Process tree, Polymorphism, Metamorphism, Class imbalance, Class inseparability, Variance fractal dimension, Correlation fractal dimension, Information fractal dimension, Spectral fractal dimension, Graph theory, Time graphs, Cognitive machine intelligence, Cognitive computing, Cyber kill chain, Cognitive and concurrent cyber kill chain, Semantic analysis, Features, Attributes, k-means, fBm, Fractional Brownian motion process, Cyber security, Behavioral analytics, Host anomaly detection, Malware data set, Semantics, Cyber threat hunting, Threat model, Feature elicitation, Cyber defense, Cyber event triage, CSOC, Cyber Security Operation Center, Multiscale Analysis, Multifractal, Advanced Persistent Threats, APT, Obfuscation, Cyber deception, Cognitive informatics, Computational intelligence, SIEM, Security information and event management, Penetration testing, Proactive cyber security, doctoral thesis
-
7Electronic Resource
المصدر: IJSEAT; Vol 3, No 8 (2015): August; 298-302
مصطلحات الفهرس: delay-tolerant networks; proximity malware; behavioral malware characterization; Bayesian filtering, Peer-reviewed Article