Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SciSec (4. : 2022 : Matsue; Online) Science of cyber security
1. Verfasser: Chen, Xiao (VerfasserIn)
Weitere Verfasser: Jiang, Zhengwei (VerfasserIn), Wang, Shuwei (VerfasserIn), Jing, Rongqi (VerfasserIn), Ling, Chen (VerfasserIn), Wang, Qiuyun (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback 2022 Peng, Chunying
Pitch in: A Secure Extension Signature Based on SM9 2022 Yan, Chuyi
Feature Transfer Based Network Anomaly Detection 2022 Chen, Tao
A Two-Stage Method for Fine-Grained DNS Covert Tunnel Behavior Detection 2022 Wang, Bingxu
Malware Classification Based on Semi-Supervised Learning 2022 Ding, Yu
Malware Detection Using Automated Generation of Yara Rules on Dynamic Features 2022 Si, Qin
Question Answering Models for Privacy Policies of Mobile Apps: Are We There Yet? 2022 Alkhattabi, Khalid
BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment 2022 Du, Xiangyu
Multi-region SRAM-Based TCAM for Longest Prefix 2022 Zou, Qian
A Solution for the Offline Double-Spending Issue of Digital Currencies 2022 Hong, Zhexuan
TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps 2022 Cui, Huajun
A Practical Blockchain-Based Maintenance Record System for Better Aircraft Security 2022 Jensen, Wictor Lang
The Shared Memory Based Cryptographic Card Virtualization 2022 Li, Chen
AtNet: A Novel Anti-tracking Network with Multi-Party Judgement Capability Based on Cross-Domain Small-World Topology 2022 Qin, Wenjie
Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network Attacks 2022 Xie, Jiang
Integration of Cybersecurity Related Development Processes by Using a Quantification Method 2022 Noun, Hassan
Metasploit for Cyber-Physical Security Testing with Real-Time Constraints 2022 Shrestha, Sulav Lal
Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems 2022 Zhao, Guozhu
Design of End-To-End Security for MQTT 5.0 2022 Chien, Hung-Yu
An Intrusion Detection System Based on Deep Belief Networks 2022 Belarbi, Othmane
Alle Artikel auflisten