Buscar
Mostrando ítems 1-10 de 144
N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents
From many past years, the detection of unknown malicious mobile agents before they invade the Mobile Agent Platform has been the subject of much challenging activity. The ever-growing threat of malicious agents calls for ...
NetDER: An Architecture for Reasoning About Malicious Behavior
(Springer, 2020-03)
Malicious behavior in social media has many faces, which for instance appear in the form of bots, sock puppets, creation and dissemination of fake news, Sybil attacks, and actors hiding behind multiple identities. In this ...
A malware detection system inspired on the human immune system
(2012-07-23)
Malicious programs (malware) can cause severe damage on computer systems and data. The mechanism that the human immune system uses to detect and protect from organisms that threaten the human body is efficient and can be ...
A malware detection system inspired on the human immune system
(2012-07-23)
Malicious programs (malware) can cause severe damage on computer systems and data. The mechanism that the human immune system uses to detect and protect from organisms that threaten the human body is efficient and can be ...
Detecting malicious behavior in social platforms via hybrid knowledge and data driven systems
(Elsevier Science, 2021-12)
Among the wide variety of malicious behavior commonly observed in modern social platforms, one of the most notorious is the diffusion of fake news, given its potential to influence the opinions of millions of people who ...
The Wolf of SUTD (TWOS): A dataset of malicious insider threat behavior based on a gamified competition
In this paper we present open research questions and options for data analysis of our previously designed dataset called TWOS: The Wolf of SUTD. In specified research questions, we illustrate the potential use of the TWOS ...
An Ontology Of Suspicious Software Behavior
(Ios PressAmsterdam, 2016)
An Ontology Of Suspicious Software Behavior
(IOS PRESSAMSTERDAM, 2016)
On data-centric misbehavior detection in VANETs
(2011-12-23)
Detecting misbehavior (such as transmissions of false information) in vehicular ad hoc networks (VANETs) is a very important problem with wide range of implications, including safety related and congestion avoidance ...