Narrow your search
Listing 1 - 10 of 30 << page
of 3
>>
Sort by

Book
Malicious and Unwanted Software : "The Americas" (MALWARE), 2013 8th International Conference on
Author:
ISBN: 1479925349 1479925365 1479925357 Year: 2013 Publisher: [Place of publication not identified] : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
MALWARE : 2017 12th International Conference on Malicious and Unwanted Software : 11-14 October 2017, Fajardo, Puerto Rico
Authors: ---
ISBN: 1538614367 153862592X Year: 2017 Publisher: Piscataway, New Jersey : Institute of Electrical and Electronics Engineers,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
High Accuracy Detection of Mobile Malware Using Machine Learning
Author:
ISBN: 3036571744 3036571752 Year: 2023 Publisher: [Place of publication not identified] : MDPI - Multidisciplinary Digital Publishing Institute,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As increasingly sophisticated and evasive malware attacks continue to emerge, more effective detection solutions to tackle the problem are being sought through the application of advanced machine learning techniques. This reprint presents several advances in the field including: a new method of generating adversarial samples through byte sequence feature extraction using deep learning; a state-of-the-art comparative evaluation of deep learning approaches for mobile botnet detection; a novel visualization-based approach that utilizes images for Android botnet detection; a study on the detection of drive-by exploits in images using deep learning; etc. Furthermore, this reprint presents state-of-the-art reviews about machine learning-based detection techniques that will increase researchers' knowledge in the field and enable them to identify future research and development directions.


Book
2016 11th International Conference on Malicious and Unwanted Software (MALWARE)
Author:
ISBN: 1509045422 1509045430 Year: 2016 Publisher: Piscataway : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Focus of the conference this year is twofold (1) Security architectures & reformulated solutions, and (2) The demise of traditional end point protection The topics are described in the paragraphs below In the past, the security protection model that most organizations applied to protect their infrastructure was simply the Everything but the Kitchen Sink model meaning, add devices that protect the enterprise network perimeter (Trusted Zone), add devices that protect your mobile device, add devices that protect your data base, and on, and on In essence, this model simply amounted to the accumulation of security devices Given the increased number, scope, and frequency of breaches in the last few years, it is clear that this model has failed Security products are no longer about single or even multiple independent security devices each providing close as we can get to perfect standalone protection MALCON will explore alternative architectures and solutions.


Book
2018 13th International Conference on Malicious and Unwanted Software : 22-24 October 2018, Nantucket Island, Massachusetts, USA
Authors: ---
ISBN: 1728101557 1728101565 Year: 2018 Publisher: Piscataway, New Jersey : Institute of Electrical and Electronics Engineers,


Book
Cuckoo malware analysis : analyze malware using Cuckoo Sandbox
Authors: ---
ISBN: 1782169245 9781782169246 1782169237 9781782169239 9781782169239 Year: 2013 Publisher: Birmingham : Packt Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Analyze malware using Cuckoo Sandbox Learn how to analyze malware in a straightforward way with minimum technical skills Understand the risk of the rise of document-based malware Enhance your malware analysis concepts through illustrations, tips and tricks, step-by-step instructions, and practical real-world scenarios In Detail Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. Cuckoo Malware Analysis will cover basic theories in sandboxing, automating malware analysis, and how to prepare a safe environment lab for malware analysis. You will get acquainted with Cuckoo Sandbox architecture and learn how to install Cuckoo Sandbox, troubleshoot the problems after installation, submit malware samples, and also analyze PDF files, URLs, and binary files. This book also covers memory forensics – using the memory dump feature, additional memory forensics using Volatility, viewing result analyses using the Cuckoo analysis package, and analyzing APT attacks using Cuckoo Sandbox, Volatility, and Yara. Finally, you will also learn how to screen Cuckoo Sandbox against VM detection and how to automate the scanning of e-mail attachments with Cuckoo.


Book
Android malware detection using machine learning : data-driven fingerprinting and threat intelligence
Author:
ISBN: 303074664X 3030746631 Year: 2021 Publisher: Cham, Switzerland : Springer,


Book
How to defeat advanced malware : new tools for protection and forensics
Author:
ISBN: 0128027312 0128027533 1322480826 9780128027530 9780128027318 Year: 2015 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed fo


Book
ECrime : 2014 APWG Symposium on Electronic Crime Research : 23-25 September 2014.
Author:
ISBN: 147996509X 1479965111 1479965103 Year: 2014 Publisher: New York : IEEE,


Book
Ransomware Revealed : A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
Author:
ISBN: 1484242556 1484242548 Year: 2019 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly. Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today—the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future. Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems. You will: Be aware of how ransomware infects your system Comprehend ransomware components in simple terms Recognize the different types of ransomware families Identify the attack vectors employed by ransomware to infect computer systems Know how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies) Know what to do if a successful ransomware infection takes place Understand how to pay the ransom as well as the pros and cons of paying Set up a ransomware response plan to recover from such attacks.

Listing 1 - 10 of 30 << page
of 3
>>
Sort by