利用惡意攻擊樣板比對評量資安威脅情資報告品質

呂晟維 - 2023 - tdr.lib.ntu.edu.tw
惡意程式的資安威脅情報(CTI) 記錄入侵指標(IoCs) 和惡意活動, 對於偵測和應對網路威脅的
環節扮演了至關重要的角色. 然而, 目前現有研究很少涉及文本報告的評估 …

A Multimodal Immune System Inspired Defense Architecture for Detecting and Deterring Digital Pathogens in Container Hosted Web Services

IM Khalil - 2023 - search.proquest.com
With the increased use of web technologies, microservices, and Application Programming
Interface (API) for integration between systems, and with the development of …

The Hidden Threat: Detecting API Hooking in Memory Forensics Using Open-Source Tools

A Christopher, N Mandela, T Mbinda… - … Conference on New …, 2023 - ieeexplore.ieee.org
API hooking is a prevalent technique utilized by malicious actors to compromise the integrity
and security of computer systems. Through the interception and manipulation of system …