+

Hatada et al., 2017 - Google Patents

Finding new varieties of malware with the classification of network behavior

Hatada et al., 2017

View PDF
Document ID
6082966409992592090
Author
Hatada M
Mori T
Publication year
Publication venue
IEICE TRANSACTIONS on Information and Systems

External Links

Snippet

An enormous number of malware samples pose a major threat to our networked society. Antivirus software and intrusion detection systems are widely implemented on the hosts and networks as fundamental countermeasures. However, they may fail to detect evasive …
Continue reading at www.jstage.jst.go.jp (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US11483318B2 (en) Providing network security through autonomous simulated environments
Victor et al. IoT malware: An attribute-based taxonomy, detection mechanisms and challenges
Agarwal et al. A closer look at intrusion detection system for web applications
Prokhorenko et al. Web application protection techniques: A taxonomy
US10230750B2 (en) Secure computing environment
Le et al. DoubleGuard: Detecting intrusions in multitier web applications
US8997236B2 (en) System, method and computer readable medium for evaluating a security characteristic
Almarri et al. Optimised malware detection in digital forensics
US11632393B2 (en) Detecting and mitigating malware by evaluating HTTP errors
Deng et al. Lexical analysis for the webshell attacks
Pramono Anomaly-based intrusion detection and prevention system on website usage using rule-growth sequential pattern analysis: Case study: Statistics of Indonesia (BPS) website
Sharif Web attacks analysis and mitigation techniques
Prapty et al. Using retriever augmented large language models for attack graph generation
US20250240313A1 (en) Large language model (llm) powered detection reasoning solution
Huertas Celdrán et al. Creation of a dataset modeling the behavior of malware affecting the confidentiality of data managed by IoT devices
Hatada et al. Finding new varieties of malware with the classification of network behavior
Jayasekara Security operations & incident management: Case study analysis
Chen et al. A proactive approach to intrusion detection and malware collection
Jogdand et al. Survey of different IDS using honeytoken based techniques to mitigate cyber threats
Çelik et al. Detection of trickbot and emotet banking trojans with machine learning
Ghosh et al. Leveraging machine learning for proactive detection and mitigation of Android RAT
Pan et al. TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network
Pareek A study of web application penetration testing
RU2778635C1 (en) System and method for outside control of the cyberattack surface
Grégio et al. Pinpointing malicious activities through network and system-level malware execution behavior
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载