E-Book, Englisch, 651 Seiten, eBook
E-Book, Englisch, 651 Seiten, eBook
ISBN: 978-3-030-62582-5
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
1. Optimizing Multi-class Classi?cation of Binaries Based on Static Features.- 2.Detecting Abusive Comments Using Ensemble Deep Learning Algorithms.- 3. Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS.- 4. Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges.- 5. A Selective Survey of Deep Learning Techniques and Their Application to Malware Analysis.- 6. A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classi?cation.- 7. Word Embedding Techniques for Malware Evolution Detection.- 8. Reanimating Historic Malware Samples.- 9. DURLD: Malicious URL detection using Deep learning based Character-level representations.- 10. Sentiment Analysis for Troll Detection on Weibo.- 11. Beyond Labeling: Using Clustering to Build Network Behavioral Pro?les of Malware Families.- 12. Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs.- 13. An Empirical Analysis of Image-Based Learning Techniques for Malware Classi?cation.- 14. A Survey of Intelligent Techniques for Android Malware Detection.- 15. Malware Detection with Sequence-Based Machine Learning and Deep Learning.- 16. A Novel Study on Multinomial Classi?cation of x86/x64 Linux ELF Malware Types and Families through Deep Neural Networks.- 17. Cluster Analysis of Malware Family Relationships.- 18. Log-Based Malicious Activity Detection using Machine and Deep Learning.- 19. Deep Learning in Malware Identi?cation and Classi?cation.- 20. Image Spam Classi?cation with Deep Neural Networks.- 21. Fast and Straightforward Feature Selection Method.- 22. On Ensemble Learning.- 23. A Comparative Study of Adversarial Attacks to Malware Detectors Based on Deep Learning.- 24. Review of Arti?cial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability.- 25. Universal Adversarial Perturbations and Image Spam Classi?ers.