Autoencoder-based Malware Analysis: An Imagery Analysis Approach to Enhance the Security of Smart City IoT
Abstract
References
Recommendations
The Detection of 8 Type Malware botnet using Hybrid Malware Analysis in Executable File Windows Operating Systems
ICEC '15: Proceedings of the 17th International Conference on Electronic Commerce 2015Nowadays a lot of botnet are being used for the purpose of cybercrime such as distributed denial of services (DDos) or information stealing. Botnet is a collection of computers connected through Internet that has been taken over by an attacker using ...
Malware Detection by Static Checking and Dynamic Analysis of Executables
The advanced malware continue to be a challenge in digital world that signature-based detection techniques fail to conquer. The malware use many anti-detection techniques to mutate. Thus no virus scanner can claim complete malware detection even for ...
Security in a smart city: challenges and solutions
SCA '19: Proceedings of the 4th International Conference on Smart City ApplicationsIn this paper we will discuss what concerns the smart city, the services in a smart city, also the mechanism of data processing and data analysis especially the data generated by the sensors because it considered a point of vulnerability in a smart city ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/52bb091e-7d26-445c-8dbd-da0a6966957b/3640771.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- Russian Science Foundation
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 14Total Downloads
- Downloads (Last 12 months)14
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format