A survey of machine learning methods and challenges for windows malware classification

E Raff, C Nicholas - arXiv preprint arXiv:2006.09271, 2020 - arxiv.org
Malware classification is a difficult problem, to which machine learning methods have been
applied for decades. Yet progress has often been slow, in part due to a number of unique …

基于时间序列聚类的主题发现与演化分析研究

李海林, 邬先利 - 情报学报, 2019 - cqvip.com
针对现有研究对文献主题发现和演化分析方法的单一性, 本文提出了基于时间序列聚类的主题
发现与演化分析方法. 该方法首先通过共词分析找出文献数据集中高频关键词的共现矩阵 …

[PDF][PDF] MTA-KDD'19: A Dataset for Malware Traffic Detection.

I Letteri, G Della Penna, L Di Vita, MT Grifa - Itasec, 2020 - ricerca.univaq.it
In the present paper we describe a new, updated and refined dataset specifically tailored to
train and evaluate machine learning based malware traffic analysis algorithms. To generate …

Feature selection strategies for http botnet traffic detection

I Letteri, G Della Penna… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
We report about a HTTP botnet detection strategy based on a behavioral analysis of raw
traffic data with the aim at minimizing resources necessary for the detection. It involves the …

Diffusion of white-hat botnet using lifespan with controllable ripple effect for malware removal in IoT networks

MA Bin Ahmadon, S Yamaguchi - Sensors, 2023 - mdpi.com
Self-propagating malware has been infecting thousands of IoT devices and causing security
breaches worldwide. Mitigating and cleaning self-propagating malware is important but …

Botnet detection technique for corporate area network

O Savenko, S Lysenko, A Kryshchuk… - 2013 IEEE 7th …, 2013 - ieeexplore.ieee.org
A new approach for the botnet detection based on multi-agent system is proposed. For
increasing of the efficiency of botnet detection the multi-agent system was involved that …

Comparison between security majors in virtual machine and linux containers

U Gupta - arXiv preprint arXiv:1507.07816, 2015 - arxiv.org
Virtualization started to gain traction in the domain of information technology in the early
2000s when managing resource distribution was becoming an uphill task for developers. As …

Application of multi factor authentication in internet of things domain

U Gupta - arXiv preprint arXiv:1506.03753, 2015 - arxiv.org
Authentication forms the gateway to any secure system. Together with integrity,
confidentiality and authorization it helps in preventing any sort of intrusions into the system …

[HTML][HTML] 时间序列数据挖掘中的动态时间弯曲研究综述

李海林, 梁叶, 王少春 - 控制与决策, 2018 - kzyjc.alljournals.cn
动态时间弯曲是一种重要的相似性度量方法, 对时间序列数据挖掘的性能起着至为关键的作用,
对其进行全面和深入的探索具有十分重要的理论意义和实际应用价值. 首先简述动态时间弯曲 …

[PDF][PDF] Study on cloud security risk and remedy

A Aich, A Sen - Int. J. Grid Distrib. Comput, 2015 - academia.edu
Recently, Cloud computing is most powerful research area because of its flexibility and cost
efficiency. The environment provides dynamic, easily scalable services. Although cloud …