Results 1 to 10 of about 50,315 (212)
Hardening DGA Classifiers Utilizing IVAP [PDF]
Domain Generation Algorithms (DGAs) are used by malware to generate a deterministic set of domains, usually by utilizing a pseudo-random seed. A malicious botmaster can establish connections between their command-and-control center (C&C) and any malware-infected machines by registering domains that will be DGA-generated given a specific seed, rendering
Charles Grumer +4 more
openalex +3 more sources
Inline Detection of DGA Domains Using Side Information [PDF]
Malware applications typically use a command and control (C&C) server to manage bots to perform malicious activities. Domain Generation Algorithms (DGAs) are popular methods for generating pseudo-random domain names that can be used to establish a
Raaghavi Sivaguru +4 more
doaj +2 more sources
A differentiable Gillespie algorithm for simulating chemical kinetics, parameter estimation, and designing synthetic biological circuits [PDF]
The Gillespie algorithm is commonly used to simulate and analyze complex chemical reaction networks. Here, we leverage recent breakthroughs in deep learning to develop a fully differentiable variant of the Gillespie algorithm.
Krishna Rijal, Pankaj Mehta
doaj +2 more sources
Inactivation of SARS-CoV-2 by Simulated Sunlight on Contaminated Surfaces
We studied the stability of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) under different simulated outdoor conditions by changing the temperature (20°C and 35°C), the illuminance (darkness, 10 klx, and 56 klx), and/or the cleanness of the
Jérémy Raiteux +6 more
doaj +1 more source
Survey of DGA Domain Name Detection Based on Character Feature [PDF]
Recent years have seen extensive adoption of domain generation algorithms(DGA) by botnets.Efficient detection of DGA domain name is of great significance for discovering botnets and ensuring cyber security.DGA domain name detection me-thod based on ...
WANG Yu, WANG Zuchao, PAN Rui
doaj +1 more source
Power transformers are the basic elements of the power grid, which is directly related to the reliability of the electrical system. Many techniques were used to prevent power transformer failures, but the Dissolved Gas Analysis (DGA) remains the most ...
Yassine Mahamdi +3 more
doaj +1 more source
Gli intermediari dei dati. | Data Intermediaries.
La strategia europea sui dati ha quale fulcro la condivisione e la libera circolazione delle informazioni, anche personali. È chiara espressione del perseguimento di questo obiettivo il recente regolamento UE 2022/868/UE (Data Governance Act), che detta
Dianora Polletti
doaj +1 more source
Unexpected atypical isolates of Bacillus cereus s.l. occasionally challenge conventional microbiology and even the most advanced techniques for anthrax detection. For anticipating and gaining trust, 65 isolates of Bacillus cereus s.l.
Mehdi Abdelli +6 more
doaj +1 more source
D3-SACNN: DGA Domain Detection With Self-Attention Convolutional Network
Botnets are currently one of the main cyber security threats. In order to enhance the concealment, botnets usually use Domain Generation Algorithm (DGA) to establish communication between bots and command and control servers.
Kejun Zhao +3 more
doaj +1 more source
Analysis of Malware Dns Attack on the Network Using Domain Name System Indicators
University of Bina Darma Palembang has its own DNS server and in this study using log data from the Bina Darma University DNS server as data in the study, DNS log server data is analyzed by network traffic, using Network Analyzer tools to see the ...
Beni Brahara +2 more
doaj +1 more source

