Search Results - "Windows Native API"
-
1
An Adaptive Anomaly Detection Method Based on Incremental Hidden Markov Model and Windows Native API
Authors:
Thesis Advisors:
File Description: 61
Availability: http://ndltd.ncl.edu.tw/handle/99798065283101455253
-
2
Authors:
Contributors:
Source: Maribor
Subject Terms: operacijski sistemi, prestrezanje klicev, vrivanje skupnih knjižnic, nadzornik procesov, aplikacijski vmesnik za jedro operacijskega sistema, operating systems, hooking, DLL injection, process monitor, Windows native API, info:eu-repo/classification/udc/004.451.9:004.9(043.2)
File Description: application/pdf
Relation: https://dk.um.si/IzpisGradiva.php?id=17139; https://dk.um.si/Dokument.php?id=19814&dn=; https://plus.si.cobiss.net/opac7/bib/14991894?lang=sl
-
3
Authors: et al.
Contributors: et al.
Subject Terms: Engineering, General—Protection mechanisms General Terms Security, Diversity Keywords Diversity, Windows Native API, Code injection attacks
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5580; http://mu.cs.ucdavis.edu/~fhsu/papers/asiaccs07.pdf
-
4
Authors: et al.
Source: Sensors (14248220); Aug2024, Vol. 24 Issue 15, p4859, 24p
-
5
Authors:
Source: Proceedings of the IADIS International Conference on WWW/Internet. Nov2007, p84-88. 5p. 1 Diagram, 1 Chart.
Subject Terms: Intrusion detection systems (Computer security), Algorithms, Data mining, Windows (Graphical user interfaces), Online data processing
-
6
Authors:
Source: Concurrency & Computation: Practice & Experience; 9/25/2020, Vol. 32 Issue 18, p1-11, 11p
Subject Terms: RANSOMWARE, MACHINE learning, COMPUTER network security
-
7
Authors:
Source: Security & Communication Networks; 2/27/2020, p1-17, 17p
Subject Terms: HUMAN behavior models, MALWARE, MALWARE prevention, MACHINE learning
-
8
Authors:
Source: International Journal of Machine Learning & Cybernetics; Feb2020, Vol. 11 Issue 2, p339-358, 20p
-
9
Authors: Mathew, Alex
Source: International Research Journal of Innovations in Engineering & Technology; Mar2022, Vol. 6 Issue 3, p88-90, 3p
Subject Terms: RANSOMWARE, INTERNET security, MACHINE learning, ALGORITHMS, INVOCATION
-
10
Authors: et al.
Source: Applied Sciences (2076-3417); Sep2019, Vol. 9 Issue 18, p3748, 13p
Subject Terms: MALWARE, MALWARE prevention, COMPUTER systems, ANTIMICROBIAL peptides
-
11
Authors:
Source: SOFSEM 2017: Theory & Practice of Computer Science; 2017, p473-484, 12p
-
12
Authors: et al.
Source: FM 2016: Formal Methods; 2016, p779-785, 7p
-
13
Authors: et al.
Source: Fundamenta Informaticae; 2017, Vol. 153 Issue 1-2, p105-124, 20p
Subject Terms: BINARY operations, ELIMINATION (Mathematics), MATHEMATICAL models, INFORMATION theory, BINARY codes
-
14
Authors: et al.
Source: Applied Cryptography & Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers; 2015, p497-517, 21p
-
15
Authors: et al.
Source: International Conference on Information Networking 2013 (ICOIN); 2013, p481-486, 6p
-
16
Authors:
Source: Opportunities & Challenges for Next-generation Applied Intelligence; 2009, p219-224, 6p
-
17
Authors: et al.
Source: Proceedings of the Fifth Mexican International Conference in Computer Science, 2004 (ENC 2004); 2004, p361-367, 7p
-
18
Authors: et al.
Source: ACM Computing Surveys; Apr2012, Vol. 44 Issue 2, p6-6:42, 42p, 4 Diagrams, 1 Chart
-
19
-
20
Authors:
Source: IEEE International Conference on Sensor Networks, Ubiquitous & Trustworthy Computing (SUTC'06); 2006, p6-6, 1p
Nájsť tento článok vo Web of Science
Full Text Finder