A method for estimating process maliciousness with Seq2Seq model
ICOIN, pp. 255-260, 2018.
In recent years, cyber-attacks become more sophisticated and the damage caused by these attacks also becomes serious problem. In these attacks, specially-crafted malware, which utilizes countermeasures such as post execution binary elimination or process injection, is used not to be noticed by a target. Therefore, it is hard to detect mal...More
Full Text (Upload PDF)
PPT (Upload PPT)