Multiple instance learning for malware classification

J Stiborek, T Pevný, M Rehák - Expert Systems with Applications, 2018 - Elsevier
This work addresses classification of unknown binaries executed in sandbox by modeling
their interaction with system resources (files, mutexes, registry keys and communication with …

Probabilistic analysis of dynamic malware traces

J Stiborek, T Pevný, M Rehák - Computers & Security, 2018 - Elsevier
We propose a method to automatically group unknown binaries executed in sandbox
according to their interaction with system resources (files on the filesystem, mutexes, registry …

The study on the botnet and its prevention policies in the internet of things

Y Ji, L Yao, S Liu, H Yao, Q Ye… - 2018 IEEE 22nd …, 2018 - ieeexplore.ieee.org
With the rapid development of Internet of Things (IOT), IOT is more and more important. Also,
it faces serious security issues. This paper analyzes Mirai's architecture. The core …

Graph-based detection of malicious network communities

J Jusko - 2017 - search.proquest.com
Doctoral Thesis Page 1 Czech Technical University in Prague Faculty of Electrical Engineering
Doctoral Thesis August 2017 Jan Jusko Page 2 Page 3 Czech Technical University in Prague …

Dynamic reconfiguration of intrusion detection systems

J Stiborek - 2017 - search.proquest.com
Intrusion detection systems (IDS) used in network security are complex solutions that require
precise tuning prior to their deployment. Such tuning, however, is a problem. If done …

Reprezentace komunikace v bezpečnosti počítačových her

K Jan - 2019 - dspace.cvut.cz
Vývoj podnikových informačních systémů klade vysoké požadavky na jejich návrh a
architekturu. Kromě implementace rostoucího počtu byznys procesů jsou tyto systémy …

Reprezentace Komunikace v Bezpečnosti Počítačových her

J Kohout - 2019 - search.proquest.com
In current solutions for network security analysis, monitoring and management, machine
learning algorithms play an important role. The increasing volume of traffic and number of …

Inference na grafu reprezentující počítačovou síť

Š Mandlík - 2018 - dspace.cvut.cz
The task of inferring unknown random variables on a graph is a widely researched topic.
Representing a system of random variables as a graphical model is less constraining as the …

Identifikace podobností ve škodlivém chování v sítí

M Stanke - 2018 - dspace.cvut.cz
The goal of this thesis is to design and implement a framework to detect similarities in
classified malicious network traffic, using and combining at least two similarity metrics. The …

[引用][C] Developing Cybersecurity Capability Forensic Risk Modelling for the Internet of Things

B Antony - 2021 - Auckland University of Technology