000 | 04878nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-030-62582-5 | ||
003 | DE-He213 | ||
005 | 20240423125347.0 | ||
007 | cr nn 008mamaa | ||
008 | 201220s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030625825 _9978-3-030-62582-5 |
||
024 | 7 |
_a10.1007/978-3-030-62582-5 _2doi |
|
050 | 4 | _aHV6772-6773.3 | |
072 | 7 |
_aURH _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aURH _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
082 | 0 | 4 |
_a364,168 _223 |
245 | 1 | 0 |
_aMalware Analysis Using Artificial Intelligence and Deep Learning _h[electronic resource] / _cedited by Mark Stamp, Mamoun Alazab, Andrii Shalaginov. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXX, 651 p. 253 illus., 209 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _a1. Optimizing Multi-class Classification of Binaries Based on Static Features -- 2.Detecting Abusive Comments Using Ensemble Deep Learning Algorithms -- 3. Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS -- 4. Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges -- 5. A Selective Survey of Deep Learning Techniques and Their Application to Malware Analysis -- 6. A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification -- 7. Word Embedding Techniques for Malware Evolution Detection -- 8. Reanimating Historic Malware Samples -- 9. DURLD: Malicious URL detection using Deep learning based Character-level representations -- 10. Sentiment Analysis for Troll Detection on Weibo -- 11. Beyond Labeling: Using Clustering to Build Network Behavioral Profiles of Malware Families -- 12. Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs -- 13. An Empirical Analysis of Image-Based Learning Techniques for Malware Classification -- 14. A Survey of Intelligent Techniques for Android Malware Detection -- 15. Malware Detection with Sequence-Based Machine Learning and Deep Learning -- 16. A Novel Study on Multinomial Classification of x86/x64 Linux ELF Malware Types and Families through Deep Neural Networks -- 17. Cluster Analysis of Malware Family Relationships -- 18. Log-Based Malicious Activity Detection using Machine and Deep Learning -- 19. Deep Learning in Malware Identification and Classification -- 20. Image Spam Classification with Deep Neural Networks -- 21. Fast and Straightforward Feature Selection Method -- 22. On Ensemble Learning -- 23. A Comparative Study of Adversarial Attacks to Malware Detectors Based on Deep Learning -- 24. Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability -- 25. Universal Adversarial Perturbations and Image Spam Classifiers. | |
520 | _aThis book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases. | ||
650 | 0 | _aComputer crimes. | |
650 | 0 | _aMachine learning. | |
650 | 0 | _aComputational intelligence. | |
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aComputer Crime. |
650 | 2 | 4 | _aMachine Learning. |
650 | 2 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aSecurity Services. |
700 | 1 |
_aStamp, Mark. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAlazab, Mamoun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aShalaginov, Andrii. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030625818 |
776 | 0 | 8 |
_iPrinted edition: _z9783030625832 |
776 | 0 | 8 |
_iPrinted edition: _z9783030625849 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-62582-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c177100 _d177100 |