Carving of the OOXML document from volatile memory using unsupervised learning techniques (Englisch)
- Neue Suche nach: Ali, Noor Ul Ain
- Neue Suche nach: Iqbal, Waseem
- Weitere Informationen zu Iqbal, Waseem:
- https://orcid.org/0000-0002-3616-2621
- Neue Suche nach: Afzal, Hammad
- Weitere Informationen zu Afzal, Hammad:
- https://orcid.org/0000-0001-9583-5585
- Neue Suche nach: Ali, Noor Ul Ain
- Neue Suche nach: Iqbal, Waseem
- Weitere Informationen zu Iqbal, Waseem:
- https://orcid.org/0000-0002-3616-2621
- Neue Suche nach: Afzal, Hammad
- Weitere Informationen zu Afzal, Hammad:
- https://orcid.org/0000-0001-9583-5585
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Carving of the OOXML document from volatile memory using unsupervised learning techniques
-
Beteiligte:
-
Verlag:
- Neue Suche nach: Elsevier Ltd
-
Erscheinungsdatum:09.12.2021
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 65
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
Multi-dimensional sub/super-range signaturesIshizaka, Masahito / Kiyomoto, Shinsaku et al. | 2021
-
Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU frameworkYeoh, Wei-Zhu / Teh, Je Sen / Chen, Jiageng et al. | 2021
-
OAuth 2.0 : Architectural design augmentation for mitigation of common security vulnerabilitiesSingh, Jaimandeep / Chaudhary, Naveen Kumar et al. | 2021
-
Best current practices for OAuth/OIDC Native AppsSharif, Amir / Carbone, Roberto / Sciarretta, Giada / Ranise, Silvio et al. | 2021
-
Intrusion detection framework based on causal reasoning for DDoSZeng, ZengRi / Peng, Wei / Zeng, Detian / Zeng, Chong / Chen, YiFan et al. | 2022
-
HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approachPraseed, Amit / Thilagam, P. Santhi et al. | 2021
-
A location privacy protection method in spatial crowdsourcingSong, Fagen / Ma, Tinghuai et al. | 2021
-
DDoS attack resisting authentication protocol for mobile based online social network applicationsBhattacharya, Munmun / Roy, Sandip / Das, Ashok Kumar / Chattopadhyay, Samiran / Banerjee, Soumya / Mitra, Ankush et al. | 2022
-
Medical blockchain: Data sharing and privacy preserving of EHR based on smart contractLee, Jung-San / Chew, Chit-Jie / Liu, Jo-Yun / Chen, Ying-Chin / Tsai, Kuo-Yu et al. | 2022
-
A machine learning approach for detecting fast flux phishing hostnamesNagunwa, Thomas / Kearney, Paul / Fouad, Shereen et al. | 2022
-
A data hiding scheme based on the difference of image interpolation algorithmsBai, Xuemei / Chen, Yong / Duan, Gangpeng / Feng, Chao / Zhang, Wanli et al. | 2021
-
EO-PSI-CA: Efficient outsourced private set intersection cardinalityAdavoudi Jolfaei, Amirhossein / Mala, Hamid / Zarezadeh, Maryam et al. | 2021
-
Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensicsLim, Yirang / Youn, MinA / Chung, Hyunji / Park, Jungheum / Horsman, Graeme / Lee, Sangjin et al. | 2021
-
A novel model for voice command fingerprinting using deep learningMao, Jianghan / Wang, Chenyu / Guo, Yanhui / Xu, Guoai / Cao, Shoufeng / Zhang, Xuanwen / Bi, Zixiang et al. | 2021
-
AI@nti-Malware: An intelligent framework for defending against malware attacksMa, Yi-Wei / Chen, Jiann-Liang / Kuo, Wen-Han / Chen, Yu-Chen et al. | 2021
-
Towards time evolved malware identification using two-head neural networkYuan, Chong / Cai, Jingxuan / Tian, Donghai / Ma, Rui / Jia, Xiaoqi / Liu, Wenmao et al. | 2021
-
Image-based malicious Internet content filtering method for child protectionAlguliyev, Rasim M. / Abdullayeva, Fargana J. / Ojagverdiyeva, Sabira S. et al. | 2022
-
Constructive image steganography using example-based weighted color transferHsieh, Ku-Sung / Wang, Chung-Ming et al. | 2022
-
Locally optimum image watermark detector based on statistical modeling of SWT-EFMs magnitudesWang, Xiang-yang / Shen, Xin / Tian, Jia-lin / Niu, Pan-pan / Yang, Hong-ying et al. | 2021
-
Carving of the OOXML document from volatile memory using unsupervised learning techniquesAli, Noor Ul Ain / Iqbal, Waseem / Afzal, Hammad et al. | 2021
-
Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of ThingsAli, Mohammad / Sadeghi, Mohammad-Reza / Liu, Ximeng / Miao, Yinbin / Vasilakos, Athanasios V. et al. | 2021
-
Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems’ Communication Networks based on Bio-inspired Deep Neural Network StructureIbor, Ayei E. / Okunoye, Olusoji B. / Oladeji, Florence A. / Abdulsalam, Khadeejah A. et al. | 2022
-
Security policies by design in NoSQL document databasesBlanco, Carlos / García-Saiz, Diego / Rosado, David G. / Santos-Olmo, Antonio / Peral, Jesús / Maté, Alejandro / Trujillo, Juan / Fernández-Medina, Eduardo et al. | 2022
-
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiabilityChen, Biwen / Li, Xue / Xiang, Tao / Wang, Peng et al. | 2021
-
Secure server-aided attribute-based signature with perfect anonymity for cloud-assisted systemsHuang, Zhenjie / Lin, Zhiwei et al. | 2021
-
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-ViHoki, Jin / Isobe, Takanori / Ito, Ryoma / Liu, Fukang / Sakamoto, Kosei et al. | 2021
-
A practical privacy-preserving communication scheme for CAMs in C-ITSYue, Xiaohan / Zeng, Shuaishuai / Wang, Xibo / Yang, Lixin / Bai, Shi / He, Yuan et al. | 2021
-
Towards a robust and trustworthy machine learning system development: An engineering perspectiveXiong, Pulei / Buffett, Scott / Iqbal, Shahrear / Lamontagne, Philippe / Mamun, Mohammad / Molyneaux, Heather et al. | 2022
-
An efficient robust zero watermarking scheme for diffusion tensor-Magnetic resonance imaging high-dimensional dataGao, Jian / Li, Zhi / Fan, Bin et al. | 2021
-
Editorial Board| 2022
-
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary programLi, Xiao / Chang, Yuanhai / Ye, Guixin / Gong, Xiaoqing / Tang, Zhanyong et al. | 2021
-
Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud ComputingYang, Yang / Sun, Jianguo / Liu, Zechao / Qiao, YuQing et al. | 2022