Malware Binary Image Classification Using ı Convolutional Neural Networks

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Conference on Cyber Warfare and Security (17. : 2022 : Albany, NY; Online) 17th International Conference on Cyber Warfare and Security (ICCWS 2021)
1. Verfasser: Kiger, John (VerfasserIn)
Weitere Verfasser: Ho, Shen-Shyang (VerfasserIn), Heydari, Vahid (VerfasserIn)
Pages:17
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
An Ontology for Effective Security Incident Management 2022 Chockalingam, Sabarathinam
Protecting Networks with Intelligent Diodes 2022 Dahlstrom, Jason
Zero Trust Container Architecture (ZTCA): A Framework for Applying Zero Trust Principals to Docker Containers 2022 Leahy, Darragh
Future Needs of the Cybersecurity Workforce 2022 Justice, Connie
Taxonomy of Social Engineering Attacks: A Survey of Trends and Future Directions 2022 Maraj, Arianit
Context-Aware Cyber Threat Intelligence Exchange Platform 2022 Motlhabi, Michael
Blockchain Technology for Addressing Privacy and Security Issues in Cloud Computing 2022 Tehrani, Pardis Moslemzadeh
The Development of Cybersecurity Awareness Measurement Model in the Water Sector 2022 Mufor, Bryan S.
A Modern ICT Network Simulator for Co-Simulations in Smart Grid Applications 2022 Niehaus, Fabian
Transient Execution and Side Channel Analysis: A Vulnerability or a Science Experiment? 2022 Shepherd, Michael
What is a Substantial Contribution to a Research Project in Offensive Cyberspace Operations that Merits Co-Authorship? 2022 Huskaj, Gazmend
An Exploration on APTs in Biocybersecurity and Cyberbiosecurity 2022 Palmer, Xavier-Lewis
Ensuring the Security of Space Systems from Eavesdropping Attacks 2022 Richardson, Caleb
Critical Systems Protection (CSP): The US Secret Service’s Tactical Cyber Capability for Securing Protectees 2022 Hyman, Austin
Don’t Drink the Cyber: Extrapolating the Possibilities of Oldsmar’s Water Treatment Cyberattack 2022 Cervini, James
Bureau of Justice Student Computer and Digital Forensics Educational Opportunities Program: The Assessment of Online Graduate Students 2022 Choi, Kyung-Shick
A Novel DevSecOps Model for Robust Security in an MQTT Internet of Things 2022 Ekoramaradhya, Manasa
Exploring Ontologies for Mitigation Selection of Industrial Control System Vulnerabilities 2022 Heverin, Thomas
Advancing Cybersecurity Capabilities for South African Organisations Through R&D 2022 Khan, Zubeida Casmod
Zero Trust and Advanced Persistent Threats: Who Will Win the War? 2022 Karabacak, Bilge
Alle Artikel auflisten