[图书][B] Introduction to machine learning with applications in information security
M Stamp - 2022 - taylorfrancis.com
Introduction to Machine Learning with Applications in Information Security, Second Edition
provides a classroom-tested introduction to a wide variety of machine learning and deep …
provides a classroom-tested introduction to a wide variety of machine learning and deep …
[PDF][PDF] Malware detection based on source data using data mining: A survey
I Basu, N Sinha, D Bhagat, S Goswami - Am. J. Adv. Comput, 2016 - researchgate.net
In this era of the information age, malware has become a serious threat. Malware creators
create such kind of malware which can damage the entire computer, spread over the …
create such kind of malware which can damage the entire computer, spread over the …
Subroutine based detection of APT malware
J Sexton, C Storlie, B Anderson - Journal of Computer Virology and …, 2016 - Springer
Statistical detection of mass malware has been shown to be highly successful. However, this
type of malware is less interesting to cyber security officers of larger organizations, who are …
type of malware is less interesting to cyber security officers of larger organizations, who are …
GuruWS: A hybrid platform for detecting malicious web shells and web application vulnerabilities
Web application/service is now omnipresent but its security risks, such as malware and
vulnerabilities, are indeed underestimated. In this paper, we propose a protective, extensible …
vulnerabilities, are indeed underestimated. In this paper, we propose a protective, extensible …
Singular value decomposition and metamorphic detection
Metamorphic malware changes its internal structure with each infection, while maintaining
its original functionality. Such malware can be difficult to detect, particularly using static …
its original functionality. Such malware can be difficult to detect, particularly using static …
Compression-based analysis of metamorphic malware
Recent work has shown that a technique based on structural entropy measurement provides
an effective means of detecting metamorphic malware. This previous work relies on file …
an effective means of detecting metamorphic malware. This previous work relies on file …
Information complexity ranking: A new method of ranking images by algorithmic complexity
Predicting how an individual will perceive the visual complexity of a piece of information is
still a relatively unexplored domain, although it can be useful in many contexts such as for …
still a relatively unexplored domain, although it can be useful in many contexts such as for …
Hunting for pirated software using metamorphic analysis
H Rana, M Stamp - Information Security Journal: A Global …, 2014 - Taylor & Francis
In this article, we consider the problem of detecting software that has been pirated and
modified. We analyze a variety of detection techniques that have been previously studied in …
modified. We analyze a variety of detection techniques that have been previously studied in …
Detecting malware with information complexity
Malware concealment is the predominant strategy for malware propagation. Black hats
create variants of malware based on polymorphism and metamorphism. Malware variants …
create variants of malware based on polymorphism and metamorphism. Malware variants …
Detecting malware with information complexity
This work focuses on a specific front of the malware detection arms-race, namely the
detection of persistent, disk-resident malware. We exploit normalised compression distance …
detection of persistent, disk-resident malware. We exploit normalised compression distance …