Quantcast
Channel: CPS-VO - invasive software
Browsing all 98 articles
Browse latest View live

Botnet Defense System and Its Basic Strategy Against Malicious Botnet

Yamaguchi, S..  2020.  Botnet Defense System and Its Basic Strategy Against Malicious Botnet. 2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). :1—2.

View Article



Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural...

Yerima, S. Y., Alzaylaee, M. K..  2020.  Mobile Botnet Detection: A Deep Learning Approach Using Convolutional Neural Networks. 2020 International Conference on Cyber Situational Awareness, Data...

View Article

Robust Early Stage Botnet Detection using Machine Learning

Muhammad, A., Asad, M., Javed, A. R..  2020.  Robust Early Stage Botnet Detection using Machine Learning. 2020 International Conference on Cyber Warfare and Security (ICCWS). :1—6.

View Article

Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots

Lingenfelter, B., Vakilinia, I., Sengupta, S..  2020.  Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots. 2020 10th Annual Computing and Communication Workshop and Conference...

View Article

Reliability Analysis of Concurrent Data based on Botnet Modeling

Cui, L., Huang, D., Zheng, X..  2020.  Reliability Analysis of Concurrent Data based on Botnet Modeling. 2020 Fourth International Conference on Inventive Systems and Control (ICISC). :825—828.

View Article


Identification of Botnet Activity in IoT Network Traffic Using Machine Learning

Hegde, M., Kepnang, G., Mazroei, M. Al, Chavis, J. S., Watkins, L..  2020.  Identification of Botnet Activity in IoT Network Traffic Using Machine Learning. 2020 International Conference on Intelligent...

View Article

AI-Powered Honeypots for Enhanced IoT Botnet Detection

Memos, V. A., Psannis, K. E..  2020.  AI-Powered Honeypots for Enhanced IoT Botnet Detection. 2020 3rd World Symposium on Communication Engineering (WSCE). :64—68.

View Article

IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine...

Susanto, Stiawan, D., Arifin, M. A. S., Idris, M. Y., Budiarto, R..  2020.  IoT Botnet Malware Classification Using Weka Tool and Scikit-learn Machine Learning. 2020 7th International Conference on...

View Article


A Two-stage P2P Botnet Detection Method Based on Statistical Features

Zhou, B., He, J., Tan, M..  2020.  A Two-stage P2P Botnet Detection Method Based on Statistical Features. 2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS)....

View Article


Towards Data-Driven Characterization of Brute-Force Attackers

Wilkens, F., Fischer, M..  2020.  Towards Data-Driven Characterization of Brute-Force Attackers. 2020 IEEE Conference on Communications and Network Security (CNS). :1—9.

View Article

A Conceptual Direction on Automatically Evolving Computer Malware using...

Murali, R., Velayutham, C. S..  2020.  A Conceptual Direction on Automatically Evolving Computer Malware using Genetic and Evolutionary Algorithms. 2020 International Conference on Inventive...

View Article

IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware

Wang, B., Dou, Y., Sang, Y., Zhang, Y., Huang, J..  2020.  IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware. ICC 2020 - 2020 IEEE International Conference on Communications...

View Article

Attacking Key Management in Ransomware

Bajpai, P., Enbody, R..  2020.  Attacking Key Management in Ransomware. IT Professional. 22:21—27.

View Article


Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection...

Das, T., Eldosouky, A. R., Sengupta, S..  2020.  Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory. 2020 International Conference on Cyber Security and...

View Article

A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data

Moti, Z., Hashemi, S., Jahromi, A. N..  2020.  A Deep Learning-based Malware Hunting Technique to Handle Imbalanced Data. 2020 17th International ISC Conference on Information Security and Cryptology...

View Article


DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection

Ganfure, G. O., Wu, C.-F., Chang, Y.-H., Shih, W.-K..  2020.  DeepGuard: Deep Generative User-behavior Analytics for Ransomware Detection. 2020 IEEE International Conference on Intelligence and...

View Article

An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme...

Ayub, M. A., Continella, A., Siraj, A..  2020.  An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network. 2020 IEEE 21st International Conference on...

View Article


Dynamic information-theoretic measures for security informatics

Colbaugh, R., Glass, K., Bauer, T..  2013.  Dynamic information-theoretic measures for security informatics. 2013 IEEE International Conference on Intelligence and Security Informatics. :45–49.

View Article
Browsing all 98 articles
Browse latest View live




Latest Images