語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Malware = handbook of prevention and detection /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Malware/ edited by Dimitris Gritzalis, Kim-Kwang Raymond Choo, Constantinos Patsakis.
其他題名:
handbook of prevention and detection /
其他作者:
Patsakis, Constantinos.
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xvii, 410 p. :ill. (chiefly color), digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Mobile and Network Security. -
電子資源:
https://doi.org/10.1007/978-3-031-66245-4
ISBN:
9783031662454
Malware = handbook of prevention and detection /
Malware
handbook of prevention and detection /[electronic resource] :edited by Dimitris Gritzalis, Kim-Kwang Raymond Choo, Constantinos Patsakis. - Cham :Springer Nature Switzerland :2025. - xvii, 410 p. :ill. (chiefly color), digital ;24 cm. - Advances in information security,v. 912512-2193 ;. - Advances in information security ;50..
Part I Theoretical foundation and modeling -- Chapter 1 Classifying Malware using Tensor Decomposition -- Chapter 2 Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks -- Chapter 3 Mathematical models for malware propagation: state of art and perspectives -- Chapter 4 Botnet Defense System: A System to Fight Botnets with Botnets -- Part II Machine learning for malware classification -- Chapter 5 Machine Learning-Based Malware Detection in a Production Setting -- Chapter 6 Machine Learning for Windows Malware Detection and Classification: Methods, Challenges and Ongoing Research -- Chapter 7 Conventional Machine Learning-based Android Malware Detectors -- Chapter 8 Conventional Machine Learning-based Android Malware Detectors -- Chapter 9 Method to automate the classification of PE32 malware using Word2vec and LSTM -- Part III Social and legal -- Chapter 10 The South African and Senegalese legislative response to malware facilitated cybercrime -- Chapter 11Malware as a Geopolitical Tool -- Part IV Malware analysis in practice and evasions -- Chapter 12 Advancements in Malware Evasion: Analysis Detection and the Future Role of AI -- Chapter 13 Unpacking malware in the real world: a step by step guide -- Chapter 14 Forensic Analysis of CapraRAT Android Malware -- Chapter 15 Hidden Realms: Exploring Steganography Methods in Games for Covert Malware Delivery -- Part V Malware ecosystem -- Chapter 16 The Malware as a Service ecosystem -- Chapter 17Preventing and detecting malware in smart environments. The smart home case.
This book provides a holistic overview of current state of the art and practice in malware research as well as the challenges of malware research from multiple angles. It also provides step-by-step guides in various practical problems, such as unpacking real-world malware and dissecting it to collect and perform a forensic analysis. Similarly, it includes a guide on how to apply state-of-the-art Machine Learning methods to classify malware. Acknowledging that the latter is a serious trend in malware, one part of the book is devoted to providing the reader with the state-of-the-art in Machine Learning methods in malware classification, highlighting the different approaches that are used for, e.g., mobile malware samples and introducing the reader to the challenges that are faced when shifting from a lab to production environment. Modern malware is fueling a worldwide underground economy. The research for this book is backed by theoretical models that simulate how malware propagates and how the spread could be mitigated. The necessary mathematical foundations and probabilistic theoretical models are introduced, and practical results are demonstrated to showcase the efficacy of such models in detecting and countering malware. It presents an outline of the methods that malware authors use to evade detection. This book also provides a thorough overview of the ecosystem, its dynamics and the geopolitical implications are introduced. The latter are complemented by a legal perspective from the African legislative efforts, to allow the reader to understand the human and social impact of malware. This book is designed mainly for researchers and advanced-level computer science students trying to understand the current landscape in malware, as well as applying artificial intelligence and machine learning in malware detection and classification. Professionals who are searching for a perspective to streamline the challenges that arise, when bringing lab solutions into a production environment, and how to timely identify ransomware signals at scale will also want to purchase this book. Beyond data protection experts, who would like to understand how malware siphons private information, experts from law enforcement authorities and the judiciary system, who want to keep up with the recent developments will find this book valuable as well.
ISBN: 9783031662454
Standard No.: 10.1007/978-3-031-66245-4doiSubjects--Topical Terms:
1211619
Mobile and Network Security.
LC Class. No.: QA76.76.C68
Dewey Class. No.: 005.8
Malware = handbook of prevention and detection /
LDR
:05044nam a2200337 a 4500
001
1159844
003
DE-He213
005
20241115120515.0
006
m d
007
cr nn 008maaau
008
251029s2025 sz s 0 eng d
020
$a
9783031662454
$q
(electronic bk.)
020
$a
9783031662447
$q
(paper)
024
7
$a
10.1007/978-3-031-66245-4
$2
doi
035
$a
978-3-031-66245-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.76.C68
072
7
$a
URD
$2
bicssc
072
7
$a
COM060040
$2
bisacsh
072
7
$a
URD
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.76.C68
$b
M262 2025
245
0 0
$a
Malware
$h
[electronic resource] :
$b
handbook of prevention and detection /
$c
edited by Dimitris Gritzalis, Kim-Kwang Raymond Choo, Constantinos Patsakis.
260
$a
Cham :
$c
2025.
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
300
$a
xvii, 410 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Advances in information security,
$x
2512-2193 ;
$v
v. 91
505
0
$a
Part I Theoretical foundation and modeling -- Chapter 1 Classifying Malware using Tensor Decomposition -- Chapter 2 Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks -- Chapter 3 Mathematical models for malware propagation: state of art and perspectives -- Chapter 4 Botnet Defense System: A System to Fight Botnets with Botnets -- Part II Machine learning for malware classification -- Chapter 5 Machine Learning-Based Malware Detection in a Production Setting -- Chapter 6 Machine Learning for Windows Malware Detection and Classification: Methods, Challenges and Ongoing Research -- Chapter 7 Conventional Machine Learning-based Android Malware Detectors -- Chapter 8 Conventional Machine Learning-based Android Malware Detectors -- Chapter 9 Method to automate the classification of PE32 malware using Word2vec and LSTM -- Part III Social and legal -- Chapter 10 The South African and Senegalese legislative response to malware facilitated cybercrime -- Chapter 11Malware as a Geopolitical Tool -- Part IV Malware analysis in practice and evasions -- Chapter 12 Advancements in Malware Evasion: Analysis Detection and the Future Role of AI -- Chapter 13 Unpacking malware in the real world: a step by step guide -- Chapter 14 Forensic Analysis of CapraRAT Android Malware -- Chapter 15 Hidden Realms: Exploring Steganography Methods in Games for Covert Malware Delivery -- Part V Malware ecosystem -- Chapter 16 The Malware as a Service ecosystem -- Chapter 17Preventing and detecting malware in smart environments. The smart home case.
520
$a
This book provides a holistic overview of current state of the art and practice in malware research as well as the challenges of malware research from multiple angles. It also provides step-by-step guides in various practical problems, such as unpacking real-world malware and dissecting it to collect and perform a forensic analysis. Similarly, it includes a guide on how to apply state-of-the-art Machine Learning methods to classify malware. Acknowledging that the latter is a serious trend in malware, one part of the book is devoted to providing the reader with the state-of-the-art in Machine Learning methods in malware classification, highlighting the different approaches that are used for, e.g., mobile malware samples and introducing the reader to the challenges that are faced when shifting from a lab to production environment. Modern malware is fueling a worldwide underground economy. The research for this book is backed by theoretical models that simulate how malware propagates and how the spread could be mitigated. The necessary mathematical foundations and probabilistic theoretical models are introduced, and practical results are demonstrated to showcase the efficacy of such models in detecting and countering malware. It presents an outline of the methods that malware authors use to evade detection. This book also provides a thorough overview of the ecosystem, its dynamics and the geopolitical implications are introduced. The latter are complemented by a legal perspective from the African legislative efforts, to allow the reader to understand the human and social impact of malware. This book is designed mainly for researchers and advanced-level computer science students trying to understand the current landscape in malware, as well as applying artificial intelligence and machine learning in malware detection and classification. Professionals who are searching for a perspective to streamline the challenges that arise, when bringing lab solutions into a production environment, and how to timely identify ransomware signals at scale will also want to purchase this book. Beyond data protection experts, who would like to understand how malware siphons private information, experts from law enforcement authorities and the judiciary system, who want to keep up with the recent developments will find this book valuable as well.
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Artificial Intelligence.
$3
646849
650
1 4
$a
Privacy.
$3
575491
650
0
$a
Malware (Computer software)
$x
Prevention
$3
1487127
650
0
$a
Malware (Computer software)
$v
Congresses.
$3
787104
700
1
$a
Patsakis, Constantinos.
$e
author.
$3
1397577
700
1
$a
Choo, Kim-Kwang Raymond.
$3
895890
700
1
$a
Gritzalis, Dimitris.
$3
884670
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
830
0
$a
Advances in information security ;
$v
50.
$3
881246
856
4 0
$u
https://doi.org/10.1007/978-3-031-66245-4
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入