語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Malware Analysis Using Artificial In...
~
SpringerLink (Online service)
Malware Analysis Using Artificial Intelligence and Deep Learning
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Malware Analysis Using Artificial Intelligence and Deep Learning/ edited by Mark Stamp, Mamoun Alazab, Andrii Shalaginov.
其他作者:
Shalaginov, Andrii.
面頁冊數:
XX, 651 p. 253 illus., 209 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Security Services. -
電子資源:
https://doi.org/10.1007/978-3-030-62582-5
ISBN:
9783030625825
Malware Analysis Using Artificial Intelligence and Deep Learning
Malware Analysis Using Artificial Intelligence and Deep Learning
[electronic resource] /edited by Mark Stamp, Mamoun Alazab, Andrii Shalaginov. - 1st ed. 2021. - XX, 651 p. 253 illus., 209 illus. in color.online resource.
1. Optimizing Multi-class Classification of Binaries Based on Static Features -- 2.Detecting Abusive Comments Using Ensemble Deep Learning Algorithms -- 3. Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS -- 4. Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges -- 5. A Selective Survey of Deep Learning Techniques and Their Application to Malware Analysis -- 6. A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification -- 7. Word Embedding Techniques for Malware Evolution Detection -- 8. Reanimating Historic Malware Samples -- 9. DURLD: Malicious URL detection using Deep learning based Character-level representations -- 10. Sentiment Analysis for Troll Detection on Weibo -- 11. Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families -- 12. Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs -- 13. An Empirical Analysis of Image-Based Learning Techniques for Malware Classification -- 14. A Survey of Intelligent Techniques for Android Malware Detection -- 15. Malware Detection with Sequence-Based Machine Learning and Deep Learning -- 16. A Novel Study on Multinomial Classification of x86/x64 Linux ELF Malware Types and Families through Deep Neural Networks -- 17. Cluster Analysis of Malware Family Relationships -- 18. Log-Based Malicious Activity Detection using Machine and Deep Learning -- 19. Deep Learning in Malware Identification and Classification -- 20. Image Spam Classification with Deep Neural Networks -- 21. Fast and Straightforward Feature Selection Method -- 22. On Ensemble Learning -- 23. A Comparative Study of Adversarial Attacks to Malware Detectors Based on Deep Learning -- 24. Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability -- 25. Universal Adversarial Perturbations and Image Spam Classifiers.
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
ISBN: 9783030625825
Standard No.: 10.1007/978-3-030-62582-5doiSubjects--Topical Terms:
1211616
Security Services.
LC Class. No.: HV6772-6773.3
Dewey Class. No.: 005.8
Malware Analysis Using Artificial Intelligence and Deep Learning
LDR
:04223nam a22004095i 4500
001
1050928
003
DE-He213
005
20210819200032.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030625825
$9
978-3-030-62582-5
024
7
$a
10.1007/978-3-030-62582-5
$2
doi
035
$a
978-3-030-62582-5
050
4
$a
HV6772-6773.3
072
7
$a
URH
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
URH
$2
thema
082
0 4
$a
005.8
$2
23
082
0 4
$a
364.168
$2
23
245
1 0
$a
Malware Analysis Using Artificial Intelligence and Deep Learning
$h
[electronic resource] /
$c
edited by Mark Stamp, Mamoun Alazab, Andrii Shalaginov.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XX, 651 p. 253 illus., 209 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
1. Optimizing Multi-class Classification of Binaries Based on Static Features -- 2.Detecting Abusive Comments Using Ensemble Deep Learning Algorithms -- 3. Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS -- 4. Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges -- 5. A Selective Survey of Deep Learning Techniques and Their Application to Malware Analysis -- 6. A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification -- 7. Word Embedding Techniques for Malware Evolution Detection -- 8. Reanimating Historic Malware Samples -- 9. DURLD: Malicious URL detection using Deep learning based Character-level representations -- 10. Sentiment Analysis for Troll Detection on Weibo -- 11. Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families -- 12. Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs -- 13. An Empirical Analysis of Image-Based Learning Techniques for Malware Classification -- 14. A Survey of Intelligent Techniques for Android Malware Detection -- 15. Malware Detection with Sequence-Based Machine Learning and Deep Learning -- 16. A Novel Study on Multinomial Classification of x86/x64 Linux ELF Malware Types and Families through Deep Neural Networks -- 17. Cluster Analysis of Malware Family Relationships -- 18. Log-Based Malicious Activity Detection using Machine and Deep Learning -- 19. Deep Learning in Malware Identification and Classification -- 20. Image Spam Classification with Deep Neural Networks -- 21. Fast and Straightforward Feature Selection Method -- 22. On Ensemble Learning -- 23. A Comparative Study of Adversarial Attacks to Malware Detectors Based on Deep Learning -- 24. Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability -- 25. Universal Adversarial Perturbations and Image Spam Classifiers.
520
$a
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
650
2 4
$a
Security Services.
$3
1211616
650
2 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Machine Learning.
$3
1137723
650
1 4
$a
Computer Crime.
$3
1226852
650
0
$a
Computer security.
$3
557122
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Machine learning.
$3
561253
650
0
$a
Computer crimes.
$3
564161
700
1
$a
Shalaginov, Andrii.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1355371
700
1
$a
Alazab, Mamoun.
$e
editor.
$1
https://orcid.org/0000-0002-1928-3704
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1309526
700
1
$a
Stamp, Mark.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
771818
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030625818
776
0 8
$i
Printed edition:
$z
9783030625832
776
0 8
$i
Printed edition:
$z
9783030625849
856
4 0
$u
https://doi.org/10.1007/978-3-030-62582-5
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入