[图书][B] Introduction to machine learning with applications in information security

M Stamp - 2022 - taylorfrancis.com
Introduction to Machine Learning with Applications in Information Security, Second Edition
provides a classroom-tested introduction to a wide variety of machine learning and deep …

[PDF][PDF] Malware detection based on source data using data mining: A survey

I Basu, N Sinha, D Bhagat, S Goswami - Am. J. Adv. Comput, 2016 - researchgate.net
In this era of the information age, malware has become a serious threat. Malware creators
create such kind of malware which can damage the entire computer, spread over the …

Subroutine based detection of APT malware

J Sexton, C Storlie, B Anderson - Journal of Computer Virology and …, 2016 - Springer
Statistical detection of mass malware has been shown to be highly successful. However, this
type of malware is less interesting to cyber security officers of larger organizations, who are …

GuruWS: A hybrid platform for detecting malicious web shells and web application vulnerabilities

VG Le, HT Nguyen, DP Pham, VO Phung… - Transactions on …, 2019 - Springer
Web application/service is now omnipresent but its security risks, such as malware and
vulnerabilities, are indeed underestimated. In this paper, we propose a protective, extensible …

Singular value decomposition and metamorphic detection

RK Jidigam, TH Austin, M Stamp - Journal of Computer Virology and …, 2015 - Springer
Metamorphic malware changes its internal structure with each infection, while maintaining
its original functionality. Such malware can be difficult to detect, particularly using static …

Compression-based analysis of metamorphic malware

J Lee, TH Austin, M Stamp - International Journal of …, 2015 - inderscienceonline.com
Recent work has shown that a technique based on structural entropy measurement provides
an effective means of detecting metamorphic malware. This previous work relies on file …

Information complexity ranking: A new method of ranking images by algorithmic complexity

T Chambon, JL Guillaume, J Lallement - Entropy, 2023 - mdpi.com
Predicting how an individual will perceive the visual complexity of a piece of information is
still a relatively unexplored domain, although it can be useful in many contexts such as for …

Hunting for pirated software using metamorphic analysis

H Rana, M Stamp - Information Security Journal: A Global …, 2014 - Taylor & Francis
In this article, we consider the problem of detecting software that has been pirated and
modified. We analyze a variety of detection techniques that have been previously studied in …

Detecting malware with information complexity

N Alshahwan, ET Barr, D Clark, G Danezis… - Entropy, 2020 - mdpi.com
Malware concealment is the predominant strategy for malware propagation. Black hats
create variants of malware based on polymorphism and metamorphism. Malware variants …

Detecting malware with information complexity

N Alshahwan, ET Barr, D Clark, G Danezis - arXiv preprint arXiv …, 2015 - arxiv.org
This work focuses on a specific front of the malware detection arms-race, namely the
detection of persistent, disk-resident malware. We exploit normalised compression distance …