A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
INTRUSION DETECTION SYSTEMS: A REVIEW
2017
International Journal of Advanced Research in Computer Science
WannaCry Attack: In May 2017, the WannaCry Ransomware spread through the Internet, using an exploit vector named EternalBlue. ...
to develop a morphological framework for IDS for easy understanding. ...
P2P Bots A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker's purpose without their owners' knowledge. ...
doi:10.26483/ijarcs.v8i8.4703
fatcat:gbd4sfehwjd6vktthnlp7jfhoa
Survey of Machine Learning Techniques for Malware Analysis
[article]
2018
arXiv
pre-print
We also outline a number of issues and challenges, including those concerning the used datasets, and identify the main current topical trends and how to possibly advance them. ...
Coping with malware is getting more and more challenging, given their relentless growth in complexity and volume. ...
Memory accesses Any data of interest such as user generated content, Windows Registry key, configuration and network activity passes through main memory, hence analysing how memory is accessed can reveal ...
arXiv:1710.08189v2
fatcat:b5ob6qtmo5gu7gcmoeo4yw6kye
SIGL: Securing Software Installations Through Deep Graph Learning
[article]
2021
arXiv
pre-print
SIGL collects traces of system call activity, building a data provenance graph that it analyzes using a novel autoencoder architecture with a graph long short-term memory network (graph LSTM) for the encoder ...
and a standard multilayer perceptron for the decoder. ...
Cette recherche a été financée par le Conseil de recherches en sciences naturelles et en génie du Canada (CRSNG). ...
arXiv:2008.11533v2
fatcat:dqdb6itehjbhpesqq6pn56wasq
An orchestration approach for unwanted Internet traffic identification
2012
Computer Networks
needs a payload). ...
It permits the hiding of the protocol structure (data and control messages through their encryption). ...
doi:10.1016/j.comnet.2012.04.018
fatcat:2aeso6gfq5dmhixzfzpjo7jrwm
D1.1 - State of the Art Analysis
2021
Zenodo
) introducing the software development frameworks and hardware solutions which allow to run such applications in a computing continuum. ...
The aim of the AI-SPRINT "Artificial intelligence in Secure PRIvacy-preserving computing coNTinuum" project is to develop a platform composed of design and runtime management tools to seamlessly design ...
Indeed, black box approaches can derive performance models from data to make predictions without a priori knowledge about the internals of the target system. ...
doi:10.5281/zenodo.6372377
fatcat:f6ldfuwivbcltew4smiiwphfty
NSUWorks Improved Detection for Advanced Polymorphic Malware Improved Detection for Advanced Polymorphic Malware
2017
unpublished
The study constructed a prototype to automate feature extraction, assemble files for analysis, and analyze results through multiple clustering algorithms. ...
This study provided a novel approach to expand the malware body of knowledge and improve the detection for polymorphic malware targeting Microsoft operating systems. iv ...
WEKA had a major upgrade and release that took time to configure. Yara and Volatility are tools for analysis. Volatility is an advanced memory analysis framework for deeper inspection of memory. ...
fatcat:nyxs77nwsvepfpbboz23nrbjdy
International Journal of Computer Science July 2021
2021
Zenodo
See authors guide for manuscript preparation and submission guidelines. ...
, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. ...
Indeed, through these classifications many network intruders or intrusions are discovered.. ...
doi:10.5281/zenodo.5543977
fatcat:vxk2ynl3l5bbpcvpda2lt4qef4
A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software
2017
IEEE Transactions on Software Engineering
This paper contributes a comprehensive taxonomy to classify and characterize the state-of-the-art research in this area. ...
The systematic analysis of the research literature has revealed patterns, trends, and gaps in the existing literature, and underlined key challenges and opportunities that will shape the focus of future ...
-09-1-0273 from the Army Research Office, HSHQDC-14-C-B0040 from the Department of Homeland Security, and FA95501610030 from the Air Force Office of Scientific Research. ...
doi:10.1109/tse.2016.2615307
fatcat:lf4auma3fbe6thk4bxxsvasg4u
The Ethics of Cybersecurity
2020
Against this backdrop this new book series from Springer provides a forum for interdisciplinary discussion and normative analysis of emerging technologies that are likely to have a significant impact on ...
In attempting to navigate utopian and dystopian visions of the future, it becomes clear that technological progress and its moral quandaries call for new policies and legislative responses. ...
The authors are grateful to Stephanie Loreck and Oleg Geier for comments on a draft of this chapter. ...
doi:10.5167/uzh-194182
fatcat:g6nlulogfng75d4fl6yw7xqbse
OSTP-AWhite House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence
2017
Figshare
White House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence ...
Erik Brynjolfsson and Andrew McAfee (http://secondmachineage.com), and by Frey and Osborne (2013) that AI and autonomous systems may replace humans in a large fraction of current jobs, on a timescale that ...
For the long term, we recommend policies that will encourage the designers of transformative AI systems to work together cooperatively, perhaps through multinational and multicorporate collaborations, ...
doi:10.6084/m9.figshare.4640305
fatcat:26aelpe4ejbupao5yh2mys2pzq
AN ENHANCEMENT ON TARGETED PHISHING ATTACKS IN THE STATE OF QATAR
2021
Therefore, this research aims to explore targeted attacks in specific organisations in the state of Qatar by presenting a new technique to prevent targeted attacks. ...
The latest report by Kaspersky on Spam and Phishing, listed Qatar as one of the top 10 countries by percentage of email phishing and targeted phishing attacks. ...
The request for information and responds to it without the knowledge of the user. ...
doi:10.24377/ljmu.t.00011837
fatcat:s3ecq4zenjghniewsfnz37c2ca