+

Wawryn et al., 2021 - Google Patents

Detection of anomalies in compiled computer program files inspired by immune mechanisms using a template method

Wawryn et al., 2021

View HTML
Document ID
12585474661739554753
Author
Wawryn K
Widuliński P
Publication year
Publication venue
Journal of Computer Virology and Hacking Techniques

External Links

Snippet

An intrusion detection system inspired by the human immune system is described: a custom artificial immune system that monitors a local area containing critical files in the operating system. The proposed mechanism scans the files and checks for possible malware-induced …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Aslan et al. Intelligent behavior-based malware detection system on cloud computing environment
Surendran et al. A TAN based hybrid model for android malware detection
Liu et al. SecDeep: Secure and performant on-device deep learning inference framework for mobile and IoT devices
Poudyal et al. Analysis of crypto-ransomware using ML-based multi-level profiling
Banin et al. Multinomial malware classification via low-level features
Chandramohan et al. A scalable approach for malware detection through bounded feature space behavior modeling
Wawryn et al. Detection of anomalies in compiled computer program files inspired by immune mechanisms using a template method
Fattori et al. Hypervisor-based malware protection with accessminer
Gómez‐Hernández et al. Inhibiting crypto‐ransomware on windows platforms through a honeyfile‐based approach with R‐Locker
Wheeler Countering trusting trust through diverse double-compiling
Sandıkkaya et al. DeMETER in clouds: detection of malicious external thread execution in runtime with machine learning in PaaS clouds
Gupta et al. Detection of vulnerabilities in blockchain smart contracts: a review
Kumar et al. Efficient hashing technique for malicious profile detection at hypervisor environment
Zhou et al. Hardware-based on-line intrusion detection via system call routine fingerprinting
Zhang et al. Android malware detection combined with static and dynamic analysis
Sivaraju An insight into deep learning based cryptojacking detection model
Piromsopa et al. Survey of protections from buffer-overflow attacks
Zuhair A panoramic evaluation of machine learning and deep learning-aided ransomware detection tools using a hybrid cluster of rich smartphone traits
Buchner et al. Survey on trusted execution environments
Lanet et al. Memory forensics of a java card dump
Nugraha et al. Malware classification using machine learning algorithm
Daghmehchi Firoozjaei et al. Parent process termination: an adversarial technique for persistent malware
Çalışkan et al. The Recent Trends in Ransomware Detection and Behaviour Analysis
Poudyal Multi-level analysis of Malware using Machine Learning
Wang et al. Machine-learning-based malware detection for virtual machine by analyzing opcode sequence
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载