Results 241 to 250 of about 134,256 (265)
Some of the next articles are maybe not open access.
Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN
International Conference on Data Mining and Big Data, 2017Machine learning has been used to detect new malware in recent years, while malware authors have strong motivation to attack such algorithms. Malware authors usually have no access to the detailed structures and parameters of the machine learning models ...
Weiwei Hu, Ying Tan
semanticscholar +1 more source
2006 IEEE International Performance Computing and Communications Conference, 2006
J.M. Fernandez, P. Bureau
openaire +2 more sources
J.M. Fernandez, P. Bureau
openaire +2 more sources
Types of Malware and Malware Distribution Strategies
2015The goal of this chapter is to provide a brief overview of different types of malware that have been used to carry out cyber-attacks. In most cases, we will provide examples of each category of malware. Moreover, malware tends to be distributed in different ways and propagate in different ways.
V. S. Subrahmanian +3 more
openaire +1 more source
Malware intelligence: beyond malware analysis
International Journal of Advanced Intelligence Paradigms, 2019Ekta Gandotra +2 more
openaire +1 more source
Malware traffic classification using convolutional neural network for representation learning
International Conference on Information Networking, 2017Wei Wang +4 more
semanticscholar +1 more source

