نتایج جستجو برای: malicious

تعداد نتایج: 12653  

Journal: :Proceedings of the National Academy of Sciences 2011

Journal: :AI 2022

Drones are commonly used in numerous applications, such as surveillance, navigation, spraying pesticides autonomous agricultural systems, various military services, etc., due to their variable sizes and workloads. However, malicious drones that carry harmful objects often adversely intrude restricted areas attack critical public places. Thus, the timely detection of can prevent potential harm. ...

2016
Hiep Vu-Van Insoo Koo

Cooperative spectrum sensing (CSS) can improve spectrum sensing accuracy, but it can be injured due to potential attacks from malicious cognitive radio user who reports false sensing results to the fusion center (FC). Many researchers focus on reducing the effect of malicious users on the accuracy of spectrum sensing. A promising method to detect malicious users is to determine their abnormal s...

2014
Chao Yang Zhaoyan Xu Guofei Gu Vinod Yegneswaran Phillip A. Porras

Most existing malicious Android app detection approaches rely on manually selected detection heuristics, features, and models. In this paper, we describe a new, complementary system, called DroidMiner, which uses static analysis to automatically mine malicious program logic from known Android malware, abstracts this logic into a sequence of threat modalities, and then seeks out these threat mod...

2001
Matthew G. Schultz Eleazar Eskin Erez Zadok Salvatore J. Stolfo

A serious security threat today is malicious executables, especially new, unseen malicious executables often arriving as email attachments. These new malicious executables are created at the rate of thousands every year and pose a serious security threat. Current anti-virus systems attempt to detect these new malicious programs with heuristics generated by hand. This approach is costly and ofte...

2014
Suyeon Yoo Sehun Kim

Misuse detection method and anomaly detection method are widely used for the detection of malicious web pages. Both are based on machine learning. Misuse detection can detect known malicious web pages, but it cannot detect new ones. In contrast, anomaly detection can detect unknown malicious web pages, but it has a high false positive rate. In order to achieve a high detection rate through prec...

2009
Robert Moskovitch Clint Feher Yuval Elovici

Signature-based anti-viruses are very accurate, but are limited in detecting new malicious code. Dozens of new malicious codes are created every day, and the rate is expected to increase in coming years. To extend the generalization to detect unknown malicious code, heuristic methods are used; however, these are not successful enough. Recently, classification algorithms were used successfully f...

2016
Peter Braun Manfred Broy Frank Houdek Matthias Kirchmayr Mark Müller et

Computer hardware and Internet is growing so fast today, security threats of malicious executable code are getting more serious. Basically, malicious executable codes are categorized into three kinds – virus, Spam, Trojan horse, and worm. Current anti-virus products cannot detect all the malicious codes, especially for those unseen, polymorphism malicious

2017
Samuel Bennett Moore William Bradley Glisson Mark Yampolskiy

The utilization of 3D printing technology within the manufacturing process creates an environment that is potentially conducive to malicious activity. Previous research in 3D printing focused on attack vector identification and intellectual property protection. This research develops and implements malicious code using Printrbot’s branch of the open source Marlin 3D printer firmware. Implementa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید