Early Detection of In-Memory Malicious Activity Based on Run-Time Environmental Features

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:CSCML (5. : 2021 : Beer Sheva) Cyber Security Cryptography and Machine Learning
1. Verfasser: Yaffe, Dorel (VerfasserIn)
Weitere Verfasser: Hendler, Danny (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Robust Multivariate Anomaly-Based Intrusion Detection System for Cyber-Physical Systems 2021 Dutta, Aneet Kumar
Privacy Vulnerability of NeNDS Collaborative Filtering 2021 Nussbaum, Eyal
History Binding Signature: (Extended Abstract) 2021 Dolev, Shlomi
Software Integrity and Validation Using Cryptographic Composability and Computer Vision 2021 Beaver, Donald
Meta-X: A Technique for Reducing Communication in Geographically Distributed Computations 2021 Afrati, Foto
Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent 2021 Veugen, Thijs
Automatic Detection of Water Stress in Corn Using Image Processing and Deep Learning 2021 Soffer, Mor
Theoretical Aspects of a Priori On-Line Assessment of Data Predictability in Applied Tasks 2021 Frenkel, Sergey
Randomly Rotate Qubits, Compute and Reverse for Weak Measurements Resilient QKD and Securing Entanglement: (Extended Abstract) 2021 Bitan, Dor
Effective Enumeration of Infinitely Many Programs that Evade Formal Malware Analysis 2021 Liagkou, Vasiliki
Binding BIKE Errors to a Key Pair 2021 Drucker, Nir
Use of Blockchain for Ensuring Data Integrity ın Cloud Databases 2021 Vainshtein, Yakov
BLINDLY FOLLOW: SITS CRT and FHE for DCLSMPC of DUFSM (Extended Abstract) 2021 Dolev, Shlomi
Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks 2021 Chillotti, Ilaria
DepthStAr: Deep Strange Arguments Detection 2021 Berlin, Michael
Tortoise and Hares Consensus: The Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies 2021 Hubáček, Iddo Bentov. Pavel
Game of Drones - Detecting Spying Drones Using Time Domain Analysis 2021 Nassi, Ben
Lawful Interception in WebRTC Peer-To-Peer Communication 2021 Wagner, Assaf
Hierarchical Ring Signatures Immune to Randomness Injection Attacks 2021 Krzywiecki, Lukasz
Warped Input Gaussian Processes for Time Series Forecasting 2021 Vinokur, Igor
Alle Artikel auflisten