يعرض 1 - 7 نتائج من 7 نتيجة بحث عن '"Malware characterization"', وقت الاستعلام: 0.52s تنقيح النتائج
  1. 1
    Report

    المساهمون: Armée de l'air et de l'espace, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS), École Centrale de Lyon (ECL), Université de Lyon, Graphes, AlgOrithmes et AppLications (GOAL), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL)

    المصدر: https://hal.science/hal-03192097 ; 2021.

    Relation: info:eu-repo/semantics/altIdentifier/arxiv/2104.03586; hal-03192097; https://hal.science/hal-03192097; https://hal.science/hal-03192097/document; https://hal.science/hal-03192097/file/Android_malware_detection.pdf; ARXIV: 2104.03586

  2. 2
  3. 3
    Academic Journal

    المساهمون: Bocchi, Enrico, Grimaudo, Luigi, Mellia, Marco, Baralis, ELENA MARIA, Saha, Sabyasachi, Miskovic, Stanislav, Modelo Howard, Gaspar, Lee, Sung Ju

    وصف الملف: STAMPA

    Relation: info:eu-repo/semantics/altIdentifier/wos/WOS:000388546500003; volume:109; firstpage:142; lastpage:156; numberofpages:15; journal:COMPUTER NETWORKS; http://hdl.handle.net/11583/2655007; info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-85006186596; http://www.journals.elsevier.com/computer-networks/; http://www.sciencedirect.com/science/article/pii/S1389128616300949

  4. 4
    Dissertation/ Thesis

    المؤلفون: Khan, Muhammad Salman

    المساهمون: McLeod, Robert (Electrical and Computer Engineering) Kinsner, Witold (Electrical and Computer Engineering) Goertzen, Andrew (Physics and Astronomy) Wang, Yingxu (Electrical and Computer Engineering, University of Calgary), Ferens, Ken (Electrical and Computer Engineering)

    وصف الملف: application/pdf

    Relation: Muhammad Salman Khan, Ken Ferens, & Witold Kinsner, (2015) “A cognitive multifractal approach to characterize complexity of non-stationary and malicious DNS data traffic using adaptive sliding window”, in proceedings of IEEE 14th Intl. Conf. Cognitive Informatics & Cognitive Computing (ICCI*CC15), Beijing, China, 2015. (doi:10.1109/icci-cc.2015.7259368).; Muhammad Salman Khan, Ken Ferens, & Witold Kinsner, (2015) “A polyscale autonomous sliding window for cognitive machine classification of malicious Internet traffic”, in proceedings of 14th International Conference on Security and Management (SAM'15), WorldComp 2015, Las Vegas, USA, 2015.; Muhammad Salman Khan, Sana Siddiqui, Ken Ferens, & Witold Kinsner, (2016) "Spectral Fractal Dimension Trajectory (SFDT) to measure complexity of malicious attacks”, in proceedings of the International Conference on Security and Management (SAM’16), WorldComp 2016, Las Vegas, USA, 2016.; Muhammad Salman Khan, Ken Ferens, & Witold Kinsner, (2015) “Multifractal singularity spectrum for cognitive cyber defence in Internet time series”, in International Journal of Software Science and Computational Intelligence (IJSSCI), 2015 (doi:10.4018/IJSSCI.2015070102).; Muhammad Salman Khan, Sana Siddiqui Robert D. McLeod, Ken Ferens, & Witold Kinsner, (2016) "Fractal based adaptive boosting algorithm for cognitive detection of computer malware”, in proceedings of 15th IEEE International Conference on Cognitive Informatics and Cognitive Computing (IEEE ICCI*CC 2016), Stanford University, USA. (doi:10.1109/ICCI-CC.2016.7862074).; Muhammad Salman Khan, Sana Siddiqui, Ken Ferens, “Cognitive modeling of polymorphic malwares using fractal based semantic characterization”, in proceedings of IEEE 2017 International Conference on Technologies for Homeland Security (HST), pp. 1-7, April 2017, Waltham, MA, USA. (doi:10.1109/THS.2017.7943487).; Sana Siddiqui, Muhammad Salman Khan, Ken Ferens, & Witold Kinsner, “Fractal based cognitive neural network to detect obfuscated and indistinguishable Internet threats”, in proceedings of the 16th IEEE International Conference on Cognitive Informatics and Cognitive Computing (IEEE ICCI*CC 2017), July 2017, University of Oxford, UK.; Sana Siddiqui, Muhammad Salman Khan, Ken Ferens, “Cognitive computing and multiscale analysis for cyber security” in Computer and Network Security Essentials Book, pp. 507-519, Ed. Kevin Daimi, Springer, 2017. (doi:10.1007/978-3-319-58424-9_29).; Muhammad Salman Khan, Sana Siddiqui, Ken Ferens, “A cognitive and concurrent cyber kill chain model” in Computer and Network Security Essentials Book, pp. 585-602, Ed. Kevin Daimi, Springer, 2017. (doi:10.1007/978-3-319-58424-9_34).; http://hdl.handle.net/1993/33600

  5. 5

    المساهمون: Politecnico di Torino = Polytechnic of Turin (Polito), Laboratory of Information, Network and Communication Sciences (LINCS), Université Pierre et Marie Curie - Paris 6 (UPMC)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut Mines-Télécom [Paris] (IMT), Réseaux, Mobilité et Services (RMS), Laboratoire Traitement et Communication de l'Information (LTCI), Institut Mines-Télécom [Paris] (IMT)-Télécom Paris-Institut Mines-Télécom [Paris] (IMT)-Télécom Paris, Département Informatique et Réseaux (INFRES), Télécom ParisTech, Symantec Corporation, Department of Computer Science [KAIST] (CS), Korea Advanced Institute of Science and Technology (KAIST)

    المصدر: Computer Networks "Special issue on Traffic and Performance in the Big Data Era"
    Computer Networks "Special issue on Traffic and Performance in the Big Data Era", 2016, ⟨10.1016/j.comnet.2016.03.021⟩

  6. 6
    Electronic Resource
  7. 7
    Electronic Resource