Multiprocess malware

M Ramilli, M Bishop, S Sun - 2011 6th international conference …, 2011 - ieeexplore.ieee.org
Malware behavior detectors observe the behavior of suspected malware by emulating its
execution or executing it in a sandbox or other restrictive, instrumented environment. This …

Multi-stage delivery of malware

M Ramilli, M Bishop - 2010 5th International Conference on …, 2010 - ieeexplore.ieee.org
Malware signature detectors use patterns of bytes, or variations of patterns of bytes, to detect
malware attempting to enter a systems. This approach assumes the signatures are both or …

[PDF][PDF] Interactive OODA processes for operational joint human-machine intelligence

LM Blaha - NATO IST-160 Specialist's Meeting: Big Data and …, 2018 - sto.nato.int
ABSTRACT A key advantage to strategic thinking with the Observe-Orient-Decide-Act
(OODA) framework is that it provides a systematic approach to get inside the decision …

A Cognitive Security Approach on How Rationality Impacts Users' Ability to Detect Large Language Model Generated Disinformation

DW Durnil - 2024 - search.proquest.com
The rise of state and non-state actors who weaponize information to negatively affect targets
has financial, geopolitical, public health, and national security impacts. There has been …

[图书][B] A design methodology for computer security testing

M Ramilli - 2012 - books.google.com
The book collects 3 years of researches in the penetration testing security field. It does not
describe underground or fancy techniques, it is most focused on the state of the art in …