MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats
暂无分享,去创建一个
[1] Mohammad Malkawi,et al. Artificial neuro fuzzy logic system for detecting human emotions , 2012 .
[2] Fei Wang,et al. ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences , 2013, Math. Comput. Model..
[3] Xiangyu Li,et al. A Distributed Implementation Algorithm for Physical Layer Security Based on Untrusted Relay Cooperation and Artificial Noise , 2014 .
[4] Christoforos Ntantogian,et al. An advanced persistent threat in 3G networks: Attacking the home network from roaming networks , 2014, Comput. Secur..
[5] Omayya Murad,et al. Artificial neuro fuzzy logic system for detecting human emotions , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).
[6] Lior Rokach,et al. Novel active learning methods for enhanced PC malware detection in windows OS , 2014, Expert Syst. Appl..
[7] Guangjun Liu,et al. Homomorphic Subspace MAC Scheme for Secure Network Coding , 2013 .
[8] Julian Jang,et al. A survey of emerging threats in cybersecurity , 2014, J. Comput. Syst. Sci..
[9] Thuc Dinh Nguyen,et al. Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer , 2013, J. Inf. Process. Syst..
[10] Jie He,et al. Analyzing Malware by Abstracting the Frequent Itemsets in API Call Sequences , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[11] Latifa Ben Arfa Rabai,et al. Classification of Security Threats in Information Systems , 2014, ANT/SEIT.
[12] Xiaofeng Liao,et al. Dynamical analysis and control strategies on malware propagation model , 2013 .
[13] Igor Santos,et al. Opcode sequences as representation of executables for data-mining-based unknown malware detection , 2013, Inf. Sci..
[14] Douglas S. Reeves,et al. Deriving common malware behavior through graph clustering , 2011, ASIACCS '11.
[15] Yi Qin,et al. SmSD : A Smart Secure Deletion Scheme for SSDs , 2014 .
[16] Tarique Mustafa. Malicious Data Leak Prevention and Purposeful Evasion Attacks: An approach to Advanced Persistent Threat (APT) management , 2013, 2013 Saudi International Electronics, Communications and Photonics Conference.
[17] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[18] Madihah Mohd Saudi,et al. An Efficient Trojan Horse Classification (ETC) , 2013 .
[19] Anupama Sharma,et al. Capturing the interplay between malware and anti-malware in a computer network , 2014, Appl. Math. Comput..
[20] Hassan Rasheed,et al. Data and infrastructure security auditing in cloud computing environments , 2014, Int. J. Inf. Manag..
[21] Elijah Blessing Rajsingh,et al. ColShield: an effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks , 2014, Human-centric Computing and Information Sciences.
[22] R. Anitha,et al. Malware detection by pruning of parallel ensembles using harmony search , 2013, Pattern Recognit. Lett..
[23] Om Prakash Verma,et al. Simple Fuzzy Rule Based Edge Detection , 2013, J. Inf. Process. Syst..