Arama Sonuçları - "malware"
Önerilen Konular
Önerilen Konular
- Computational Intelligence 12
- Computational intelligence 12
- Artificial Intelligence 10
- Artificial intelligence 10
- Data and Information Security 6
- Data protection 6
- Communications Engineering, Networks 4
- Telecommunication 4
- Data Mining and Knowledge Discovery 3
- Data mining 3
- Applied Dynamical Systems 2
- Computer Communication Networks 2
- Computer networks 2
- Computer science 2
- Dynamics 2
- Nonlinear theories 2
- Artificial intelligence, Congresses 1
- Big Data 1
- Big data 1
- Bilgisayar bilimi 1
- Chemistry, Technical 1
- Computer Imaging, Vision, Pattern Recognition and Graphics 1
- Computer architecture 1
- Computer vision 1
- Computer-Aided Engineering (CAD, CAE) and Design 1
- Computer-aided engineering 1
- Cyber attack 1
- Digital techniques 1
- Electrical and Electronic Engineering 1
- Electrical engineering 1
-
1
Some'ler için ağ ve malware analizi /
Baskı/Yayın Bilgisi 2018Full-text access
OPAC'ta görüntüle
e-Kitap -
2
-
3
-
4
Proceedings of the 3rd International Symposium of Information and Internet Technology (SYMINTECH 2018)
Baskı/Yayın Bilgisi 2019İçindekiler: “…Determining the Important Parameters in the Propagation of Malware -- Study of Natural Language Processing for Collecting Cyber Threat Intelligence Using SyntaxNet -- Entrepreneurial Growth Simulation Using Entrepreneurial Cellular Automata -- Modeling Public Transportation Using Discrete Event Simulation -- Malaysia Towards Cashless Society -- Student Enrolment Prediction Model in Higher Education Institution: A Data Mining Approach -- Big Data Analytics Framework for Smart Universities Implementation.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
5
Hardware Security and Trust Design and Deployment of Integrated Circuits in a Threatened Environment /
Baskı/Yayın Bilgisi 2017İçindekiler: “…AES Datapaths on FPGAs: a State of the Art Analysis -- Fault Attacks, Injection Techniques and Tools for Simulation -- Recent developments in side-channel analysis on Elliptic Curve Cryptography implementations -- Practical Session: Differential Power Analysis for Beginners -- Fault and Power Analysis Attack Protection Techniques for Standardized Public Key Cryptosystems -- Scan Design: Basics, Advancements and Vulnerabilities -- Manufacturing Testing & Security Countermeasures -- Malware Threats and Solutions for Trustworthy Mobile Systems Design -- Ring Oscillators and Hardware Trojan Detection -- Notions on Silicon Physically Unclonable Functions -- Implementation of delay-based PUFs on Altera FPGAs -- Implementation and Analysis of Ring Oscillator Circuits on Xilinx FPGAs.-.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
6
Advanced Computing and Systems for Security Volume Eight /
Baskı/Yayın Bilgisi 2019İçindekiler: “…Chapter 1: Enhancing security in ROS -- Chapter 2: Byte Label Malware Classification using Image Entropy -- Chapter 3: Big Data Security and Privacy: New Proposed Model of Big Data with Secured MR layer -- Chapter 4: The Concept of In-Vehicle System for Human Presence and Their Vital Signs Detection -- Chapter 5: Disaster Management System Using Vehicular Ad hoc Networks -- Chapter 6: An ensemble based approach towards sensitive miRNA target prediction -- Chapter 7: A Computer-aided Hybrid framework for early diagnosis of Breast Cancer -- Chapter 8: Naive Bayes and Decision Tree Classifier for Streaming Data using HBase.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
7
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications FICTA 2016, Volume 1 /
Baskı/Yayın Bilgisi 2017İçindekiler: “…A Framework for Dynamic Malware Analysis Based on Behavior Artifacts -- Chapter 56. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
8
Trends in Cyber-Physical Multi-Agent Systems. The PAAMS Collection - 15th International Conference, PAAMS 2017
Baskı/Yayın Bilgisi 2018İçindekiler: “…Acceleration of Dissimilarity-based Classification Algorithms using Multi-core Computation -- A Study on IoT Technologies in Smart Cities (An Exploratory Study in India) -- Malware Propagation Software for Wireless Sensor Networks -- New perspectives in the study of Advanced Persistent Threats -- Towards Modelling Organisational Dynamics for Large-Scale Multiagent Systems -- On the optimal NFVI-PoP placement for SDN-enabled 5G networks Active ageing agents -- Pattern extraction for the design of predictive models in Industry 4.0 -- Rethinking posts through emotion awareness -- Self-healing mechanism over the cloud on interaction layer for AALs using HARMSChallenges in Smart Spaces: Aware of users, preferences, behaviours and habits. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
9
Intelligent Distributed Computing X Proceedings of the 10th International Symposium on Intelligent Distributed Computing - IDC 2016, Paris, France, October 10-12 2016 /
Baskı/Yayın Bilgisi 2017İçindekiler: “…-Reconfiguration of RBAC schemes by genetic algorithms.-String-based Malware Detection for Android Environments -- Optimal Configuration Model of a Fleet of Unmanned Vehicles for Interoperable Missions .…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
10
Transactions on Engineering Technologies World Congress on Engineering and Computer Science 2017 /
Baskı/Yayın Bilgisi 2019İçindekiler: “…Reliable Energy Generation Using Hybrid System Technology to Improve Standard of Living in the Rural Area -- 19. Android Mobile Malware Classification Using a Tokenization Approach -- 20. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
11
Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 /
Baskı/Yayın Bilgisi 2017İçindekiler: “…Morphology Based Approach for Number Plate Extraction -- Chapter 3. NeSeDroid - Android Malware Detection Based on Network Traffic and Sensitive Resource Accessing -- Chapter 4. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
12
Computer and Network Security Essentials
Baskı/Yayın Bilgisi 2018İçindekiler: “…A Strong Single Sign on User Authentication Scheme without Verifier Table for Cloud Based Services -- Chapter 15.Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers -- Chapter 16.Secure elliptic curves in Cryptography -- Chapter 17.Network models for malware propagation in Wireless Sensor Networks: An Analysis -- PART 4: BIOMETRICS AND FORENSICS -- Chapter 18. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
13
Knowledge, Information and Creativity Support Systems Selected Papers from KICSS'2014 - 9th International Conference, held in Limassol, Cyprus, on November 6-8, 2014 /
Baskı/Yayın Bilgisi 2016İçindekiler: “…-Application of Rough Sets in k Nearest Neighbours Algorithm for Classification of Incomplete Samples -- An Application of Firefly Algorithm to Position Traffic in NoSQL Database Systems -- Length of Hospital Stay and Quality of Care -- Bio-Inspired Hybrid Intelligent Method for Detecting Android Malware -- Predicting the Impact of Advertisements on Web Pages Aesthetic Impressions -- OntOSN - An Integrated Ontology for the Business-Driven Analysis of Online Social Networks -- Social Media and Communication Processes at Work: Evidence from China -- Educators as Game Developers - Model-Driven Visual Programming of Serious Games -- First Year Students' Algorithmic Skills in Tertiary Computer Science Education -- Implementing a Social Networking Educational System for Teachers' Training -- Virtual Environment for Creative and Collaborative Learning -- A Semiotic and Cognitive Approach to the Semantic Indexation of Digital Learning Resources -- The Significance of 'Ba' for the Successful Formation of Autonomous Personal Knowledge Management Systems -- The Significance of Memes for the Successful Formation of Autonomous Personal Knowledge Management Systems -- Computer Creativity in Games - How Much Knowledge is Needed? …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
14
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 Applications and Techniques in Cyber Security and Intelligence /
Baskı/Yayın Bilgisi 2019İçindekiler: “…Convolutional Neural Network Deep-Learning Models for Prediction of Shared Bicycle Demand -- Analysis of Feature Selection Techniques for Correlation-Based Network Anomaly Detection -- An RFID Path Authentication Protocol Based on Chebyshev Polynomials -- An Efficient Authentication Protocol for RFID-based Supply Chains -- Research on the Two Stage Full Life Cycle Management of Police Equipment -- Research on Audio and Video Transmission Strategy for Android -- Emojis Sentiment Analysis Based on Big Social Media Data -- A Transfer Learning Approach for Credit Scoring -- A Parallel Programming Model Research Based on Heterogeneous Multi-core Embedded Processor -- An Improved Apriori-Pro Algorithm -- An Improved Fuzzy Support Vector Machine Algorithm Based on Refactoring Class Center -- An Ensemble Data Stream Mining Algorithm for Class-imbalanced Applications -- A Gaussian-Based Trust Model for Nodes of Sensor Networks -- A Study of Face Recognition System's Testing and Evaluation Methods -- NetworkSecurity Problems and Solutions of Video Surveillance System -- Image Encryption Algorithms Based on Chaos Through Dual Scrambling of Dynamic Josephus Ring and Bit -- Statistical Analysis of Traffic-related Social Media Data of Multiple Cities in China -- Exploring Influential Factors in Recommending Algorithms for All Items and Niche Items -- A Distributed Approach of Accompany Vehicle Discovery -- Spatial Context for Correlation Filter Tracking -- The Automobile Recommendation Method Based on Sentiment Analysis of Online Comments -- An Adaptive Tracking Algorithm for Micro-Blog Topic based on Association Semantic Network -- Knowledge Extracting from Micro-Blog Topic -- Personal Relations Extraction from Microblog Text Based on Relations Trigger Words -- Recommendation Algorithm Based on Latent Semantic of Tags -- Ontology-supported Case-based Reasoning Approach for Double Scenario Model Construction in International Disaster Medical Relief Action -- Web Sanitization from Malicious Code InjectionAttacks -- Event Element Recognition Based on Improved K-means Algorithm -- A Comparative Method of Legal Documents Based on LDA -- Feature Selection Approach for Twitter Sentiment Analysis and Text classification Based on Chi-square and Naïve Bayes -- A Combined Approach of Long Term Spectral Flatness and Formant Based Voice Activity Detection -- Design and Development of Automatic Packaging Equipment for Boxed Drugs -- Development of Automatic Material Sorting Machine Based on PLC -- Intelligent Counter-terrorism Equipment Status and Development -- A Monitoring System of Ground-Air Interaction Multi-Sensory Fusion Plant Growth Condition -- RSCHE: A Virtual Grid Structure Based Routing Scheme with Cell-Header Group Exchanged for Wireless Sensor Network -- A Improved Person Reidentification Method by Selective Convolutional Descriptor Aggregation -- A Survey of Multi-object Video Tracking Algorithms -- An Overview of Image-based Person Re-identification -- Electrical Data Recovery with Weather Information via Collective Matrix Factorization -- Two-Phases Detection Scheme: Detecting Android Malware in Android Markets -- A Software Quality Testing Evaluation Method and its Power Grid Application -- An Index Display Software Evaluation Architecture for Power Grid Application on Big Data Platform -- A Unified Access Method of Heterogeneous Big Data in Power Grid Application -- Regional Power Grid dispatch and Control Integrated Backup System Based on Cloud Computing -- Detection of Anomaly in Firewall Rule-Sets -- Classification and Coding of Pipe Gallery BIM Model for Operation and Maintenance -- A UAV Operational Situation Similarity Measurement Method Based on Empirical Mode Decomposition -- Research on Parking Guidance Information System Based on "Internet Plus" -- Dynamic Multi-objective Optimization for Mixed Traffic Flow Based on Partial Least Squares Prediction Model -- Multi-objective Genetic Algorithm BasedPrefabricated Component Production Process Optimization Considering the Demand Fluctuations in the Construction Site -- Anomaly Detection in Time Series Data Based on Unthresholded Recurrence Plots -- A Two-stage Temporal Anomaly Detection Algorithm Based on Danger Theory -- A Data-driven Framework for Tunnel Infrastructure Maintenance -- A Heuristic for Legacy Information System Remodularization -- E-maintenance Platform Design for Public Infrastructure based on IFC and Semantic Web Technologies -- Building and Application of Shield Construction Big Data Analysis Platform -- A Professional Competence Measurement Approach Based on a Modified PageRank Algorithm -- Particle-Filter-based Prediction for Anomaly Detection -- Analysis on Building a Green Eco-smart City Based on Block Chain Technology -- 3D Indoor Network Model for Emergency Response of Multi-utility Tunnel -- Computer Data Integration Analysis of the Personal Credit Reporting System -- Digital Image Encryption Algorithm Based on Affine Cipher -- Research on the Evaluation Methods of the Guidance and Test on the Student Employment Based on the Computer Model -- Research on the Ideological and Political Assessment System Based on the Data Visualization -- Research on the Interaction Mechanism Between the Ideological and Political Education and the Computer Network Under the New Media Environment -- Research on the Key Technology of the Computer Graphics and Image Processing -- Research on the Security Management Information System Based on the Data Mining.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
15
Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015 /
Baskı/Yayın Bilgisi 2016İçindekiler: “…Smartphone Applications, Malware and Data Theft -- 3. Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation -- 4. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
16
Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1 /
Baskı/Yayın Bilgisi 2016İçindekiler: “…Generating Data for Testing Community Detection Algorithms -- Chapter 44. Metamorphic Malware Detection using LLVM IR and Hidden Markov Model -- Chapter 45. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
17
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications FICTA 2016, Volume 2 /
Baskı/Yayın Bilgisi 2017İçindekiler: “…Robust Flare Phase Auto Landing of Aircrafts, Based on Modified ASBO -- Chapter 34. Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines -- Chapter 35. 2D Shape Representation and Analysis Using Edge Histogram and Shape Feature -- Chapter 36. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
18
Proceedings of International Conference on ICT for Sustainable Development ICT4SD 2015 Volume 2 /
Baskı/Yayın Bilgisi 2016İçindekiler: “…Formal Transformation of UML Diagram: Use Case, Class, Sequence Diagram with Z Notation for Representing the Static & Dynamic Perspectives of System -- Chapter 4. A Survey of Android Malware Detection Strategy and Techniques -- Chapter 5. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
19
Proceedings of International Conference on Artificial Intelligence and Applications : Icaia 2020.
Baskı/Yayın Bilgisi 2020İçindekiler: “…References -- Cryptosystem Based on Hybrid Chaotic Structured Phase Mask and Hybrid Mask Using Gyrator Transform -- 1 Introduction -- 2 Theoretical Background -- 2.1 Gyrator Transform -- 2.2 Hybrid Chaotic Structured Phase Mask -- 2.3 Hybrid Mask -- 3 Proposed Work -- 4 Results -- 5 Conclusion -- References -- PE File-Based Malware Detection Using Machine Learning -- 1 Introduction -- 1.1 Static Analysis -- 1.2 Dynamic Analysis -- 2 Related Work -- 3 Discussion -- 4 Conclusion -- References -- Intelligence Graphs for Threat Intelligence and Security Policy Validation of Cyber Systems -- 1 Logical Vulnerability, Threats and Risks in Cyber Security -- 2 Ontologies, Knowledge Graphs and Process Workflows -- 3 Ontology of Transactions Under Security Threats -- 3.1 Logical Foundations of the Ontological Modelling -- 3.2 Situations, Events, Threats and Items -- 3.3 Actions -- 3.4 Parametrization -- 4 Heuristic Level and Security Policies -- 4.1 Security Policies as Heuristics -- 4.2 Types of Heuristics -- 4.3 Examples of Heuristic Rules -- 5 Workflow Level and Intelligence Graphs -- 5.1 Transaction Flow as a Graph -- 5.2 Framework Validation -- 6 Process Level, Implementation and Future Work -- References -- Anomaly Detection Using Federated Learning -- 1 Introduction -- 2 Related Work -- 2.1 Federated Learning -- 2.2 Anomaly Detection -- 2.3 Deep Learning -- 2.4 Artificial Neutral Network -- 2.5 Autoencoder -- 3 Experiment -- 4 Result -- 5 Conclusion -- References -- Enhanced Digital Image Encryption Using Sine Transformed Complex Chaotic Sequence -- 1 Introduction -- 1.1 Chaotic Theory -- 2 Proposed Encryption Strategy -- 2.1 Surrounding Pixel Matrix Using SHA-256 -- 2.2 STLS -- 2.3 Image Matrix Permutation -- 2.4 Hybrid Rotation -- 2.5 Diffusion -- 3 Simulation Example -- 4 Results -- 4.1 Security Analysis of Secret Key.…”
Full-text access
OPAC'ta görüntüle
e-Kitap