A method for estimating process maliciousness with Seq2Seq model

ICOIN, pp. 255-260, 2018.

Cited by: 1|Bibtex|Views1
EI
Other Links: dblp.uni-trier.de|academic.microsoft.com

Abstract:

In recent years, cyber-attacks become more sophisticated and the damage caused by these attacks also becomes serious problem. In these attacks, specially-crafted malware, which utilizes countermeasures such as post execution binary elimination or process injection, is used not to be noticed by a target. Therefore, it is hard to detect mal...More

Code:

Data:

Your rating :
0

 

Tags
Comments