[图书][B] Protecting Systems from Exploits Using Language-Theoretic Security

P Anantharaman - 2022 - search.proquest.com
Any computer program processing input from the user or network must validate the input.
Input-handling vulnerabilities occur in programs when the software component responsible …

Identification of Malicious PDFs Using Convolutional Neural Networks

M Zain, FB Khan, MH Durad - VFAST Transactions on Software …, 2022 - vfast.org
With multiple possible carriers of malware, one of the most targeted file formats by malware
writers is PDF format due to its inherent shortcomings as well as the limitations of PDF …