BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SciSec (4. : 2022 : Matsue; Online) Science of cyber security
1. Verfasser: Kang, Yanze (VerfasserIn)
Weitere Verfasser: Yu, Xiaobo (VerfasserIn), Meng, Weizhi (VerfasserIn), Liu, Yining (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain 2022 Kang, Yanze
Scalable M+1st-Price Auction with Infinite Bidding Price 2022 Hsu, Po-Chu
Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN 2022 Jia, Kun
ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices 2022 Gleerup, Thomas
Towards Practical Personalized Security Nudge Schemes: Investigating the Moderation Effects of Behavioral Features on Nudge Effects 2022 Qu, Leilei
ChainSCAN: A Blockchain-Based Supply Chain Alerting Framework for Food Safety 2022 Castillo, Jorge
Adapted PBFT Consensus Protocol for Sharded Blockchain 2022 Yang, Ling
Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT 2022 Hamidi, Amirreza
Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning 2022 Chen, Xiao
DroidFP: A Zero-Permission Detection Framework for Android Devices Based on Gated Recurrent Unit 2022 Liu, Xinyu
HINCDG: Multi-Meta-Path Graph Auto-Encoders for Mining of Weak Association Malicious Domains 2022 Sun, Jiawei
AttVAE: A Novel Anomaly Detection Framework for Multivariate Time Series 2022 Liu, Yi
A Hierarchical Macroeconomic Copula Model for Cyber Damages Based on Current Cyber Insurance Prices 2022 Kasper, Daniel
Cyber Social Engineering Kill Chain 2022 Rodriguez, Rosana Montanẽz
Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback 2022 Peng, Chunying
Pitch in: A Secure Extension Signature Based on SM9 2022 Yan, Chuyi
Feature Transfer Based Network Anomaly Detection 2022 Chen, Tao
A Two-Stage Method for Fine-Grained DNS Covert Tunnel Behavior Detection 2022 Wang, Bingxu
Malware Classification Based on Semi-Supervised Learning 2022 Ding, Yu
Malware Detection Using Automated Generation of Yara Rules on Dynamic Features 2022 Si, Qin
Alle Artikel auflisten