We propose a method to automatically group unknown binaries executed in sandbox according to their interaction with system resources (files on the filesystem, mutexes, registry …
Y Ji, L Yao, S Liu, H Yao, Q Ye… - 2018 IEEE 22nd …, 2018 - ieeexplore.ieee.org
With the rapid development of Internet of Things (IOT), IOT is more and more important. Also, it faces serious security issues. This paper analyzes Mirai's architecture. The core …
Doctoral Thesis Page 1 Czech Technical University in Prague Faculty of Electrical Engineering Doctoral Thesis August 2017 Jan Jusko Page 2 Page 3 Czech Technical University in Prague …
Intrusion detection systems (IDS) used in network security are complex solutions that require precise tuning prior to their deployment. Such tuning, however, is a problem. If done …
Vývoj podnikových informačních systémů klade vysoké požadavky na jejich návrh a architekturu. Kromě implementace rostoucího počtu byznys procesů jsou tyto systémy …
In current solutions for network security analysis, monitoring and management, machine learning algorithms play an important role. The increasing volume of traffic and number of …
The task of inferring unknown random variables on a graph is a widely researched topic. Representing a system of random variables as a graphical model is less constraining as the …
The goal of this thesis is to design and implement a framework to detect similarities in classified malicious network traffic, using and combining at least two similarity metrics. The …