標題: Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 11th International C Sven Dietrich Conference proceedings 2014 Springer [打印本頁] 作者: Hermit 時間: 2025-3-21 18:59
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment影響因子(影響力)
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment影響因子(影響力)學科排名
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment網(wǎng)絡公開度
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment網(wǎng)絡公開度學科排名
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment被引頻次
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment被引頻次學科排名
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment年度引用
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment年度引用學科排名
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment讀者反饋
書目名稱Detection of Intrusions and Malware, and Vulnerability Assessment讀者反饋學科排名
作者: 蚊帳 時間: 2025-3-21 21:10 作者: 不吉祥的女人 時間: 2025-3-22 00:50 作者: Lipoprotein 時間: 2025-3-22 06:23 作者: chandel 時間: 2025-3-22 09:01
Attacks on Android Clipboardte a series of attacks and categorize them into two groups, i.e., manipulation and stealing. Clipboard data manipulation may lead to common code injection attacks, like JavaScript injection and command injection. Furthermore, it can also cause phishing attacks, including web phishing and app phishin作者: 粗野 時間: 2025-3-22 16:56 作者: 粗野 時間: 2025-3-22 19:12
AV-Meter: An Evaluation of Antivirus Scans and Labels AV vendors has many applications such as guiding efforts of disinfection and countermeasures, intelligence gathering, and attack attribution, among others. Furthermore, researchers rely on AV labels to establish a baseline of ground truth to compare their detection and classification algorithms. Th作者: 萬靈丹 時間: 2025-3-22 22:57
PExy: The Other Side of Exploit Kitss has evolved into sophisticated, easily extensible frameworks that incorporate multiple exploits at the same time and are highly configurable. We are now dealing with ...In this paper we focus on the server-side part of drive-by downloads by automatically analyzing the source code of multiple explo作者: etiquette 時間: 2025-3-23 04:30 作者: FELON 時間: 2025-3-23 09:29 作者: 離開可分裂 時間: 2025-3-23 11:51
Phoenix: DGA-Based Botnet Tracking and Intelligenceism, recent work has focused on the analysis of DNS traffic to recognize botnets based on their DGAs. While previous work has concentrated on detection, we focus on supporting intelligence operations. We propose ., a mechanism that, in addition to telling DGA- and non-DGA-generated domains apart usi作者: 歹徒 時間: 2025-3-23 16:12
Quantifiable Run-Time Kernel Attack Surface Reduction much as 90% of kernel functions are not required for processing system calls originating from a typical network daemon. This results in an unnecessarily high exposure. In this paper, we introduce kRazor, an approach to reduce the kernel’s attack surface by limiting the amount of kernel code accessi作者: 特征 時間: 2025-3-23 19:06 作者: GROG 時間: 2025-3-24 01:08 作者: vasculitis 時間: 2025-3-24 04:03
Introducing Gender Budgeting in Europe experiment conducted independently by MITLL. Our technique provides an automated method to find between malware code functional relationships that may be used to establish evolutionary relationships and aid in forensics.作者: GUILT 時間: 2025-3-24 07:03
Angela O’Hagan,Elisabeth Klatzern code by crafting trigger-dependent bugs, which jump to the hidden code only if provided with the correct trigger. Thus, the hidden code also remains invisible under dynamic analysis if the correct trigger is unknown. We demonstrate the feasibility of our approach by crafting a hidden backdoor for the Nginx HTTP server module.作者: 睨視 時間: 2025-3-24 12:12 作者: Fester 時間: 2025-3-24 14:57 作者: Autobiography 時間: 2025-3-24 22:28 作者: Expostulate 時間: 2025-3-25 01:21 作者: 禮節(jié) 時間: 2025-3-25 05:04
0302-9743 viewed and selected from 60 submissions. The papers are organized in topical sections on malware, mobile security, network security and host security..978-3-319-08508-1978-3-319-08509-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: accessory 時間: 2025-3-25 09:36
Angela O‘Hagan,Elisabeth Klatzerrch is that the obfuscations are very vulnerable to reversing by means of automated analysis. We were able to deobfuscate the obfuscated variables in real world programs with false positive rates below 5%, and false negative rates typically below 10%.作者: 使服水土 時間: 2025-3-25 11:39
Gender and Class in Four Occupationsa large number of candidate apps and show multiple case studies to demonstrate its feasibility. Also, our app analysis process is formulated to benefit future app development and vulnerability detection. After a comprehensive exposure of the risk, we briefly discuss some potential solutions.作者: 宿醉 時間: 2025-3-25 18:43
https://doi.org/10.1007/978-3-531-90295-1creasing data rates under attack conditions. Based on a detailed performance profiling of typical intrusion detection systems, we outline the drawbacks of current optimization approaches and present a new approach for parallelizing the intrusion detection analysis that copes with the increasing network dynamics.作者: adhesive 時間: 2025-3-25 22:59 作者: 藝術(shù) 時間: 2025-3-26 00:35
Attacks on Android Clipboarda large number of candidate apps and show multiple case studies to demonstrate its feasibility. Also, our app analysis process is formulated to benefit future app development and vulnerability detection. After a comprehensive exposure of the risk, we briefly discuss some potential solutions.作者: abduction 時間: 2025-3-26 05:39 作者: Halfhearted 時間: 2025-3-26 10:37 作者: 善于 時間: 2025-3-26 16:15
0302-9743 ty Assessment, DIMVA 2014, held in Egham, UK, in July 2014..The 13 revised full papers presented together with one extended abstract were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on malware, mobile security, network security and host security.作者: BRAVE 時間: 2025-3-26 18:11 作者: 確定的事 時間: 2025-3-26 22:47
Gender and Class in Four Occupationseral feature extraction and detection algorithms for evaluation and comparison purposes. Experimental results demonstrate that sensor-enhanced keystroke dynamics can improve the accuracy of recent gestured-based authentication mechanisms (i.e., .>0.5%) by one order of magnitude, and the accuracy of 作者: Cytology 時間: 2025-3-27 04:06
https://doi.org/10.1007/978-3-531-90295-1lware families that are manually inspected and labeled, we pose the following questions. How do antivirus vendors perform relatively on them? How correct are the labels given by those vendors? How consistent are antivirus vendors among each other? We answer those questions unveiling many interesting作者: ARM 時間: 2025-3-27 05:35
Isabel Zorn,Susanne Maass,Heidi Schelhowecustomizable design. Our results indicate that even with a perfect drive-by download analyzer it is not trivial to trigger the expected behavior from an exploit kit so that it is classified appropriately as malicious.作者: 變態(tài) 時間: 2025-3-27 10:17 作者: carotid-bruit 時間: 2025-3-27 14:09
S. Faisal Ahmed M.D., F.R.C.P.C.H.l-known botnets: without supervision, it correctly distinguished DGA- vs. non-DGA-generated domains in 94.8 percent of the cases, characterized families of domains that belonged to distinct DGAs, and helped researchers “on the field” in gathering intelligence on suspicious domains to identify the co作者: Medley 時間: 2025-3-27 18:09
Surgical Interventions for Gender Dysphoriaadigm to OS processes and by that it does not rely on low-level OS details. The basic idea is to expose regular OS processes as a decoy to malware. Our approach focuses on concepts – such as threads or memory pages – present in every modern operating system. Therefore, . does not suffer from the dra作者: 休息 時間: 2025-3-27 23:18 作者: artless 時間: 2025-3-28 05:23
AndRadar: Fast Discovery of Android Applications in Alternative Marketsesent AndRadar, a framework for discovering multiple instances of a malicious Android application in a set of alternative application markets. AndRadar scans a set of markets in parallel to discover similar applications. Each lookup takes no more than a few seconds, regardless of the size of the mar作者: 節(jié)約 時間: 2025-3-28 09:59 作者: 抵消 時間: 2025-3-28 13:42
AV-Meter: An Evaluation of Antivirus Scans and Labelslware families that are manually inspected and labeled, we pose the following questions. How do antivirus vendors perform relatively on them? How correct are the labels given by those vendors? How consistent are antivirus vendors among each other? We answer those questions unveiling many interesting作者: Corporeal 時間: 2025-3-28 18:14
PExy: The Other Side of Exploit Kitscustomizable design. Our results indicate that even with a perfect drive-by download analyzer it is not trivial to trigger the expected behavior from an exploit kit so that it is classified appropriately as malicious.作者: 膽大 時間: 2025-3-28 19:53 作者: Analogy 時間: 2025-3-28 23:17 作者: Obstreperous 時間: 2025-3-29 04:24
Bee Master: Detecting Host-Based Code Injection Attacksadigm to OS processes and by that it does not rely on low-level OS details. The basic idea is to expose regular OS processes as a decoy to malware. Our approach focuses on concepts – such as threads or memory pages – present in every modern operating system. Therefore, . does not suffer from the dra作者: Allege 時間: 2025-3-29 09:22
Diagnosis and Emergency Patch Generation for Integer Overflow Exploitsws, these patches enable the program to survive future attacks that exploit the same integer overflows. We have implemented a SoupInt prototype that directly works on x86 binaries.We evaluated SoupInt with various input formats and a number of real world integer overflow vulnerabilities in commodity作者: grounded 時間: 2025-3-29 15:19
Detection of Intrusions and Malware, and Vulnerability Assessment11th International C作者: enumaerate 時間: 2025-3-29 17:39 作者: frugal 時間: 2025-3-29 20:56
https://doi.org/10.1007/978-3-319-08509-8anomaly detection; intrusion detection systems; malware mitigation; mobile devices; network security; sec作者: visual-cortex 時間: 2025-3-30 03:03 作者: Prologue 時間: 2025-3-30 05:00 作者: stroke 時間: 2025-3-30 08:12 作者: OATH 時間: 2025-3-30 14:58 作者: Inflamed 時間: 2025-3-30 17:37 作者: Vldl379 時間: 2025-3-30 22:32
Gender and Class in Four Occupationste a series of attacks and categorize them into two groups, i.e., manipulation and stealing. Clipboard data manipulation may lead to common code injection attacks, like JavaScript injection and command injection. Furthermore, it can also cause phishing attacks, including web phishing and app phishin作者: Eosinophils 時間: 2025-3-31 02:03
Gender and Class in Four Occupationshe great exposure to security attacks, however, call out for stronger authentication mechanisms than simple password-based identification. Biometric authentication techniques have shown potential in this context. Unfortunately, prior approaches are either excessively prone to forgery or have too low